++ LOG_DIR=/var/log/contrail
++ export CONTAINER_LOG_DIR=/var/log/contrail/database-cassandra
++ CONTAINER_LOG_DIR=/var/log/contrail/database-cassandra
++ mkdir -p /var/log/contrail/database-cassandra
++ log_file=/var/log/contrail/database-cassandra/console.log
++ touch /var/log/contrail/database-cassandra/console.log
++ chmod 600 /var/log/contrail/database-cassandra/console.log
++ exec
+++ tee -a /var/log/contrail/database-cassandra/console.log
+++ date
++ echo 'INFO: =================== Fri Apr 18 05:24:44 UTC 2025 ==================='
INFO: =================== Fri Apr 18 05:24:44 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.48
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.48
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.48
++ ANALYTICSDB_NODES=10.0.0.48
++ ANALYTICS_SNMP_NODES=10.0.0.48
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:8081 '
+++ '[' -n '10.0.0.48:8081 ' ']'
+++ echo 10.0.0.48:8081
++ ANALYTICS_SERVERS=10.0.0.48:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:9042 '
+++ '[' -n '10.0.0.48:9042 ' ']'
+++ echo 10.0.0.48:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.48:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.48
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:8086 '
+++ '[' -n '10.0.0.48:8086 ' ']'
+++ echo 10.0.0.48:8086
++ COLLECTOR_SERVERS=10.0.0.48:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.48
++ CONFIGDB_NODES=10.0.0.48
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:8082 '
+++ '[' -n '10.0.0.48:8082 ' ']'
+++ echo 10.0.0.48:8082
++ CONFIG_SERVERS=10.0.0.48:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:9161 '
+++ '[' -n '10.0.0.48:9161 ' ']'
+++ echo 10.0.0.48:9161
++ CONFIGDB_SERVERS=10.0.0.48:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:9041 '
+++ '[' -n '10.0.0.48:9041 ' ']'
+++ echo 10.0.0.48:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.48:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.48
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.48
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.48
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+=10.0.0.48:2181,
+++ '[' -n 10.0.0.48:2181, ']'
+++ echo 10.0.0.48:2181
++ ZOOKEEPER_SERVERS=10.0.0.48:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:2181 '
+++ '[' -n '10.0.0.48:2181 ' ']'
+++ echo 10.0.0.48:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.48:2181
++ RABBITMQ_NODES=10.0.0.48
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+=10.0.0.48:5673,
+++ '[' -n 10.0.0.48:5673, ']'
+++ echo 10.0.0.48:5673
++ RABBITMQ_SERVERS=10.0.0.48:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:6379 '
+++ '[' -n '10.0.0.48:6379 ' ']'
+++ echo 10.0.0.48:6379
++ REDIS_SERVERS=10.0.0.48:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.48
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:9092 '
+++ '[' -n '10.0.0.48:9092 ' ']'
+++ echo 10.0.0.48:9092
++ KAFKA_SERVERS=10.0.0.48:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.48
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.48
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CONFIG=/etc/cassandra/cassandra.yaml
+ JVM_OPTIONS_CONFIG=/etc/cassandra/jvm.options
+ cp /etc/cassandra/cassandra.origin /etc/cassandra/cassandra.yaml
+ cp /etc/cassandra/jvm.options.origin /etc/cassandra/jvm.options
+ for i in '{1..10}'
++ find_my_ip_and_order_for_node_list 10.0.0.48
++ local servers=10.0.0.48
++ local server_list=
++ IFS=,
++ read -ra server_list
++ cut -d ' ' -f 1
+++ get_local_ips
+++ tr '\n' ,
+++ sort
+++ uniq
+++ cat /proc/net/fib_trie
+++ grep -vi host
+++ awk '/32 host/ { print f } {f=$2}'
++ local local_ips=,10.0.0.48,10.126.80.1,127.0.0.1,172.17.0.1,252.48.0.1,,
++ local ord=1
++ for server in '"${server_list[@]}"'
++ local ret=0
+++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.48'\''))'
++ local server_ip=10.0.0.48
++ [[ 0 == 0 ]]
++ [[ -n 10.0.0.48 ]]
++ [[ ,10.0.0.48,10.126.80.1,127.0.0.1,172.17.0.1,252.48.0.1,, =~ ,10\.0\.0\.48, ]]
++ echo 10.0.0.48 1
++ return
+ my_ip=10.0.0.48
+ '[' -n 10.0.0.48 ']'
+ break
+ '[' -z 10.0.0.48 ']'
++ wc -w
++ tr , ' '
++ echo 10.0.0.48
+ export CASSANDRA_COUNT=1
+ CASSANDRA_COUNT=1
++ echo 10.0.0.48
++ sed 's/,/", "/g'
+ export CASSANDRA_CONNECT_POINTS=10.0.0.48
+ CASSANDRA_CONNECT_POINTS=10.0.0.48
++ echo 10.0.0.48
++ cut -d , -f 1,2
+ export CASSANDRA_SEEDS=10.0.0.48
+ CASSANDRA_SEEDS=10.0.0.48
+ export CASSANDRA_LISTEN_ADDRESS=10.0.0.48
+ CASSANDRA_LISTEN_ADDRESS=10.0.0.48
+ export CASSANDRA_RPC_ADDRESS=10.0.0.48
+ CASSANDRA_RPC_ADDRESS=10.0.0.48
+ echo 'INFO: JVM_EXTRA_OPTS=-Xms1g -Xmx2g'
INFO: JVM_EXTRA_OPTS=-Xms1g -Xmx2g
+ for yaml in Xmx Xms
++ echo -Xms1g -Xmx2g
++ sed -n 's/.*\(-Xmx[0-9]*[mMgG]\).*/\1/p'
+ opt=-Xmx2g
+ [[ -n -Xmx2g ]]
++ sed 's/-Xmx[0-9]*[mMgG]//g'
++ echo -Xms1g -Xmx2g
+ JVM_EXTRA_OPTS='-Xms1g '
+ sed -i 's/^[#]*-Xmx.*/-Xmx2g/g' /etc/cassandra/jvm.options
+ for yaml in Xmx Xms
++ sed -n 's/.*\(-Xms[0-9]*[mMgG]\).*/\1/p'
++ echo -Xms1g
+ opt=-Xms1g
+ [[ -n -Xms1g ]]
++ echo -Xms1g
++ sed 's/-Xms[0-9]*[mMgG]//g'
+ JVM_EXTRA_OPTS=
+ sed -i 's/^[#]*-Xms.*/-Xms1g/g' /etc/cassandra/jvm.options
+ export 'JVM_EXTRA_OPTS= -Dcassandra.rpc_port=9160   -Dcassandra.native_transport_port=9042   -Dcassandra.ssl_storage_port=7011   -Dcassandra.storage_port=7010   -Dcassandra.jmx.local.port=7200'
+ JVM_EXTRA_OPTS=' -Dcassandra.rpc_port=9160   -Dcassandra.native_transport_port=9042   -Dcassandra.ssl_storage_port=7011   -Dcassandra.storage_port=7010   -Dcassandra.jmx.local.port=7200'
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled False
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ cat
+ change_variable memtable_flush_writers 4
+ local VARIABLE_NAME=memtable_flush_writers
+ local VARIABLE_VALUE=4
+ sed -i 's/.*\(memtable_flush_writers\):.*\([0-9a-z]\)/\1: 4/g' /etc/cassandra/cassandra.yaml
+ change_variable concurrent_compactors 4
+ local VARIABLE_NAME=concurrent_compactors
+ local VARIABLE_VALUE=4
+ sed -i 's/.*\(concurrent_compactors\):.*\([0-9a-z]\)/\1: 4/g' /etc/cassandra/cassandra.yaml
+ change_variable compaction_throughput_mb_per_sec 256
+ local VARIABLE_NAME=compaction_throughput_mb_per_sec
+ local VARIABLE_VALUE=256
+ sed -i 's/.*\(compaction_throughput_mb_per_sec\):.*\([0-9a-z]\)/\1: 256/g' /etc/cassandra/cassandra.yaml
+ change_variable concurrent_reads 64
+ local VARIABLE_NAME=concurrent_reads
+ local VARIABLE_VALUE=64
+ sed -i 's/.*\(concurrent_reads\):.*\([0-9a-z]\)/\1: 64/g' /etc/cassandra/cassandra.yaml
+ change_variable concurrent_writes 64
+ local VARIABLE_NAME=concurrent_writes
+ local VARIABLE_VALUE=64
+ sed -i 's/.*\(concurrent_writes\):.*\([0-9a-z]\)/\1: 64/g' /etc/cassandra/cassandra.yaml
+ change_variable memtable_allocation_type offheap_objects
+ local VARIABLE_NAME=memtable_allocation_type
+ local VARIABLE_VALUE=offheap_objects
+ sed -i 's/.*\(memtable_allocation_type\):.*\([0-9a-z]\)/\1: offheap_objects/g' /etc/cassandra/cassandra.yaml
+ log_levels_map=([SYS_DEBUG]='DEBUG' [SYS_INFO]='INFO' [SYS_NOTICE]='INFO' [SYS_ERROR]="ERROR")
+ declare -A log_levels_map
+ log_level=DEBUG
+ '[' -n DEBUG ']'
+ sed -i 's/\(<logger.*org.apache.cassandra.*level="\).*\(".*\)/\1DEBUG\2/g' /etc/cassandra/logback.xml
+ echo 'INFO: CASSANDRA_SEEDS=10.0.0.48 CASSANDRA_LISTEN_ADDRESS=10.0.0.48 JVM_EXTRA_OPTS= -Dcassandra.rpc_port=9160   -Dcassandra.native_transport_port=9042   -Dcassandra.ssl_storage_port=7011   -Dcassandra.storage_port=7010   -Dcassandra.jmx.local.port=7200'
INFO: CASSANDRA_SEEDS=10.0.0.48 CASSANDRA_LISTEN_ADDRESS=10.0.0.48 JVM_EXTRA_OPTS= -Dcassandra.rpc_port=9160   -Dcassandra.native_transport_port=9042   -Dcassandra.ssl_storage_port=7011   -Dcassandra.storage_port=7010   -Dcassandra.jmx.local.port=7200
+ echo 'INFO: exec /docker-entrypoint.sh cassandra' -f
INFO: exec /docker-entrypoint.sh cassandra -f
+ exec /docker-entrypoint.sh cassandra -f
++ LOG_DIR=/var/log/contrail
++ export CONTAINER_LOG_DIR=/var/log/contrail/database-cassandra
++ CONTAINER_LOG_DIR=/var/log/contrail/database-cassandra
++ mkdir -p /var/log/contrail/database-cassandra
++ log_file=/var/log/contrail/database-cassandra/console.log
++ touch /var/log/contrail/database-cassandra/console.log
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
++ chmod 600 /var/log/contrail/database-cassandra/console.log
++ exec
+++ tee -a /var/log/contrail/database-cassandra/console.log
+++ date
++ echo 'INFO: =================== Fri Apr 18 05:24:45 UTC 2025 ==================='
INFO: =================== Fri Apr 18 05:24:45 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ awk '{print $2}'
+++++ grep -o 'dev.*'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ head -n 1
+++ grep 'inet '
+++ awk '{print $2}'
++ DEFAULT_LOCAL_IP=10.0.0.48
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=kubernetes
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=no-auth
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=False
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.48
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.48
++ ANALYTICSDB_NODES=10.0.0.48
++ ANALYTICS_SNMP_NODES=10.0.0.48
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:8081 '
+++ '[' -n '10.0.0.48:8081 ' ']'
+++ echo 10.0.0.48:8081
++ ANALYTICS_SERVERS=10.0.0.48:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:9042 '
+++ '[' -n '10.0.0.48:9042 ' ']'
+++ echo 10.0.0.48:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.48:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.48
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:8086 '
+++ '[' -n '10.0.0.48:8086 ' ']'
+++ echo 10.0.0.48:8086
++ COLLECTOR_SERVERS=10.0.0.48:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.48
++ CONFIGDB_NODES=10.0.0.48
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:8082 '
+++ '[' -n '10.0.0.48:8082 ' ']'
+++ echo 10.0.0.48:8082
++ CONFIG_SERVERS=10.0.0.48:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:9161 '
+++ '[' -n '10.0.0.48:9161 ' ']'
+++ echo 10.0.0.48:9161
++ CONFIGDB_SERVERS=10.0.0.48:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:9041 '
+++ '[' -n '10.0.0.48:9041 ' ']'
+++ echo 10.0.0.48:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.48:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=False
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=False
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=False
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.48
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.48
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.48
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+=10.0.0.48:2181,
+++ '[' -n 10.0.0.48:2181, ']'
+++ echo 10.0.0.48:2181
++ ZOOKEEPER_SERVERS=10.0.0.48:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:2181 '
+++ '[' -n '10.0.0.48:2181 ' ']'
+++ echo 10.0.0.48:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.48:2181
++ RABBITMQ_NODES=10.0.0.48
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+=10.0.0.48:5673,
+++ '[' -n 10.0.0.48:5673, ']'
+++ echo 10.0.0.48:5673
++ RABBITMQ_SERVERS=10.0.0.48:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=False
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:6379 '
+++ '[' -n '10.0.0.48:6379 ' ']'
+++ echo 10.0.0.48:6379
++ REDIS_SERVERS=10.0.0.48:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=False
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.48
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.48
+++ local server_address=10.0.0.48
+++ extended_server_list+='10.0.0.48:9092 '
+++ '[' -n '10.0.0.48:9092 ' ']'
+++ echo 10.0.0.48:9092
++ KAFKA_SERVERS=10.0.0.48:9092
++ KAFKA_SSL_ENABLE=False
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/
++ KEYSTONE_AUTH_HOST=127.0.0.1
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.48
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.48
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=False
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=False
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=False
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ / == \/\v\2\.\0 ]]
++ [[ kubernetes == \o\p\e\n\s\t\a\c\k ]]
++ [[ noauth == \k\e\y\s\t\o\n\e ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ '[' 2 -eq 0 ']'
+ '[' cassandra '!=' cassandra ']'
+ '[' cassandra = cassandra ']'
+ : 10.0.0.48
+ : 10.0.0.48
+ '[' 10.0.0.48 = auto ']'
+ : 10.0.0.48
+ '[' 10.0.0.48 = auto ']'
+ : 10.0.0.48
+ '[' -n '' ']'
+ : 10.0.0.48
+ _sed-in-place /etc/cassandra/cassandra.yaml -r 's/(- seeds:).*/\1 "10.0.0.48"/'
+ local filename=/etc/cassandra/cassandra.yaml
+ shift
+ local tempFile
++ mktemp
+ tempFile=/tmp/tmp.x4Sjk6E71c
+ sed -r 's/(- seeds:).*/\1 "10.0.0.48"/' /etc/cassandra/cassandra.yaml
+ cat /tmp/tmp.x4Sjk6E71c
+ rm /tmp/tmp.x4Sjk6E71c
+ for yaml in broadcast_address broadcast_rpc_address cluster_name endpoint_snitch listen_address num_tokens rpc_address start_rpc file_cache_size_in_mb
+ var=CASSANDRA_BROADCAST_ADDRESS
+ val=10.0.0.48
+ '[' 10.0.0.48 ']'
+ _sed-in-place /etc/cassandra/cassandra.yaml -r 's/^(# )?(broadcast_address:).*/\2 10.0.0.48/'
+ local filename=/etc/cassandra/cassandra.yaml
+ shift
+ local tempFile
++ mktemp
+ tempFile=/tmp/tmp.8YUOWb56C8
+ sed -r 's/^(# )?(broadcast_address:).*/\2 10.0.0.48/' /etc/cassandra/cassandra.yaml
+ cat /tmp/tmp.8YUOWb56C8
+ rm /tmp/tmp.8YUOWb56C8
+ for yaml in broadcast_address broadcast_rpc_address cluster_name endpoint_snitch listen_address num_tokens rpc_address start_rpc file_cache_size_in_mb
+ var=CASSANDRA_BROADCAST_RPC_ADDRESS
+ val=10.0.0.48
+ '[' 10.0.0.48 ']'
+ _sed-in-place /etc/cassandra/cassandra.yaml -r 's/^(# )?(broadcast_rpc_address:).*/\2 10.0.0.48/'
+ local filename=/etc/cassandra/cassandra.yaml
+ shift
+ local tempFile
++ mktemp
+ tempFile=/tmp/tmp.6fDGgLe5aR
+ sed -r 's/^(# )?(broadcast_rpc_address:).*/\2 10.0.0.48/' /etc/cassandra/cassandra.yaml
+ cat /tmp/tmp.6fDGgLe5aR
+ rm /tmp/tmp.6fDGgLe5aR
+ for yaml in broadcast_address broadcast_rpc_address cluster_name endpoint_snitch listen_address num_tokens rpc_address start_rpc file_cache_size_in_mb
+ var=CASSANDRA_CLUSTER_NAME
+ val=contrail_analytics
+ '[' contrail_analytics ']'
+ _sed-in-place /etc/cassandra/cassandra.yaml -r 's/^(# )?(cluster_name:).*/\2 contrail_analytics/'
+ local filename=/etc/cassandra/cassandra.yaml
+ shift
+ local tempFile
++ mktemp
+ tempFile=/tmp/tmp.mEgJOn3McL
+ sed -r 's/^(# )?(cluster_name:).*/\2 contrail_analytics/' /etc/cassandra/cassandra.yaml
+ cat /tmp/tmp.mEgJOn3McL
+ rm /tmp/tmp.mEgJOn3McL
+ for yaml in broadcast_address broadcast_rpc_address cluster_name endpoint_snitch listen_address num_tokens rpc_address start_rpc file_cache_size_in_mb
+ var=CASSANDRA_ENDPOINT_SNITCH
+ val=
+ '[' '' ']'
+ for yaml in broadcast_address broadcast_rpc_address cluster_name endpoint_snitch listen_address num_tokens rpc_address start_rpc file_cache_size_in_mb
+ var=CASSANDRA_LISTEN_ADDRESS
+ val=10.0.0.48
+ '[' 10.0.0.48 ']'
+ _sed-in-place /etc/cassandra/cassandra.yaml -r 's/^(# )?(listen_address:).*/\2 10.0.0.48/'
+ local filename=/etc/cassandra/cassandra.yaml
+ shift
+ local tempFile
++ mktemp
+ tempFile=/tmp/tmp.rm4dNlxgQc
+ sed -r 's/^(# )?(listen_address:).*/\2 10.0.0.48/' /etc/cassandra/cassandra.yaml
+ cat /tmp/tmp.rm4dNlxgQc
+ rm /tmp/tmp.rm4dNlxgQc
+ for yaml in broadcast_address broadcast_rpc_address cluster_name endpoint_snitch listen_address num_tokens rpc_address start_rpc file_cache_size_in_mb
+ var=CASSANDRA_NUM_TOKENS
+ val=
+ '[' '' ']'
+ for yaml in broadcast_address broadcast_rpc_address cluster_name endpoint_snitch listen_address num_tokens rpc_address start_rpc file_cache_size_in_mb
+ var=CASSANDRA_RPC_ADDRESS
+ val=10.0.0.48
+ '[' 10.0.0.48 ']'
+ _sed-in-place /etc/cassandra/cassandra.yaml -r 's/^(# )?(rpc_address:).*/\2 10.0.0.48/'
+ local filename=/etc/cassandra/cassandra.yaml
+ shift
+ local tempFile
++ mktemp
+ tempFile=/tmp/tmp.vA4kP1yUpO
+ sed -r 's/^(# )?(rpc_address:).*/\2 10.0.0.48/' /etc/cassandra/cassandra.yaml
+ cat /tmp/tmp.vA4kP1yUpO
+ rm /tmp/tmp.vA4kP1yUpO
+ for yaml in broadcast_address broadcast_rpc_address cluster_name endpoint_snitch listen_address num_tokens rpc_address start_rpc file_cache_size_in_mb
+ var=CASSANDRA_START_RPC
+ val=true
+ '[' true ']'
+ _sed-in-place /etc/cassandra/cassandra.yaml -r 's/^(# )?(start_rpc:).*/\2 true/'
+ local filename=/etc/cassandra/cassandra.yaml
+ shift
+ local tempFile
++ mktemp
+ tempFile=/tmp/tmp.tYAnGOKbtI
+ sed -r 's/^(# )?(start_rpc:).*/\2 true/' /etc/cassandra/cassandra.yaml
+ cat /tmp/tmp.tYAnGOKbtI
+ rm /tmp/tmp.tYAnGOKbtI