++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/database-query-engine ++ CONTAINER_LOG_DIR=/var/log/contrail/database-query-engine ++ mkdir -p /var/log/contrail/database-query-engine ++ log_file=/var/log/contrail/database-query-engine/console.log ++ touch /var/log/contrail/database-query-engine/console.log ++ chmod 600 /var/log/contrail/database-query-engine/console.log ++ exec +++ tee -a /var/log/contrail/database-query-engine/console.log +++ date ++ echo 'INFO: =================== Mon Sep 9 02:24:52 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:24:52 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=no-auth ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] ++ get_listen_ip_for_node ANALYTICSDB +++ find_my_ip_and_order_for_node ANALYTICSDB +++ local server_typ=ANALYTICSDB_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ uniq ++++ grep -vi host ++++ sort +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + hostip=10.0.0.55 ++ resolve_hostname_by_ip 10.0.0.55 ++ local ip=10.0.0.55 +++ getent hosts 10.0.0.55 +++ head -n 1 ++ local 'host_entry=10.0.0.55 cn-jenkins-deploy-platform-juju-os-418-1' ++ local name= ++ [[ -n 10.0.0.55 cn-jenkins-deploy-platform-juju-os-418-1 ]] +++ echo 10.0.0.55 cn-jenkins-deploy-platform-juju-os-418-1 +++ awk '{print $2}' ++ name=cn-jenkins-deploy-platform-juju-os-418-1 ++ [[ -n cn-jenkins-deploy-platform-juju-os-418-1 ]] ++ echo cn-jenkins-deploy-platform-juju-os-418-1 + hostname=cn-jenkins-deploy-platform-juju-os-418-1 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICSDB ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + add_ini_params_from_env QUERY_ENGINE /etc/contrail/contrail-query-engine.conf + local service_name=QUERY_ENGINE + local cfg_path=/etc/contrail/contrail-query-engine.conf + local delim=__ ++ set -o posix ++ set ++ grep '^QUERY_ENGINE__.*__.*=.*$' ++ cut -d = -f 1 ++ sort ++ sed 's/^QUERY_ENGINE__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs query-engine + local template=query-engine ++ dirname /var/log/contrail/database-query-engine + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/database-query-engine + chmod 755 /var/log/contrail/database-query-engine + mv -n '/var/log/contrail/*query-engine.log*' /var/log/contrail/database-query-engine/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/database-query-engine + find /var/log/contrail/database-query-engine -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-query-engine --conf_file /etc/contrail/contrail-query-engine.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-query-engine --conf_file /etc/contrail/contrail-query-engine.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-query-engine --conf_file /etc/contrail/contrail-query-engine.conf ST(0x10). before/connect initialization. R(0x1)U ST(0x1001). before/connect initialization. R(0x1)U ST(0x1001). SSLv2/v3 write client hello A. R(0x1)U ST(0x1002). SSLv2/v3 read server hello A. R(0xffffffff)U ST(0x10). before/connect initialization. R(0x1)U ST(0x1001). before/connect initialization. R(0x1)U ST(0x1001). SSLv2/v3 write client hello A. R(0x1)U ST(0x1002). SSLv2/v3 read server hello A. R(0xffffffff)U ST(0x10). before/connect initialization. R(0x1)U ST(0x1001). before/connect initialization. R(0x1)U ST(0x1001). SSLv2/v3 write client hello A. R(0x1)U ST(0x1002). SSLv2/v3 read server hello A. R(0xffffffff)U ST(0x10). before/connect initialization. R(0x1)U ST(0x1001). before/connect initialization. R(0x1)U ST(0x1001). SSLv2/v3 write client hello A. R(0x1)U ST(0x1002). SSLv2/v3 read server hello A. R(0xffffffff)U ST(0x10). before/connect initialization. R(0x1)U ST(0x1001). before/connect initialization. R(0x1)U ST(0x1001). SSLv2/v3 write client hello A. R(0x1)U ST(0x1002). SSLv2/v3 read server hello A. R(0xffffffff)U ST(0x1001). SSLv3 read server hello A. R(0x1)U ST(0x1001). SSLv3 read server certificate A. R(0x1)U ST(0x1001). SSLv3 read server key exchange A. R(0x1)U ST(0x1001). SSLv3 read server done A. R(0x1)U ST(0x1001). SSLv3 write client key exchange A. R(0x1)U ST(0x1001). SSLv3 write change cipher spec A. R(0x1)U ST(0x1001). SSLv3 write finished A. R(0x1)U ST(0x1001). SSLv3 flush data. R(0x1)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1001). SSLv3 read server hello A. R(0x1)U ST(0x1001). SSLv3 read server certificate A. R(0x1)U ST(0x1001). SSLv3 read server key exchange A. R(0x1)U ST(0x1001). SSLv3 read server done A. R(0x1)U ST(0x1001). SSLv3 write client key exchange A. R(0x1)U ST(0x1001). SSLv3 write change cipher spec A. R(0x1)U ST(0x1001). SSLv3 write finished A. R(0x1)U ST(0x1001). SSLv3 flush data. R(0x1)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1001). SSLv3 read server hello A. R(0x1)U ST(0x1001). SSLv3 read server certificate A. R(0x1)U ST(0x1001). SSLv3 read server key exchange A. R(0x1)U ST(0x1001). SSLv3 read server done A. R(0x1)U ST(0x1001). SSLv3 write client key exchange A. R(0x1)U ST(0x1001). SSLv3 write change cipher spec A. R(0x1)U ST(0x1001). SSLv3 write finished A. R(0x1)U ST(0x1001). SSLv3 flush data. R(0x1)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1001). SSLv3 read server hello A. R(0x1)U ST(0x1001). SSLv3 read server certificate A. R(0x1)U ST(0x1001). SSLv3 read server key exchange A. R(0x1)U ST(0x1001). SSLv3 read server done A. R(0x1)U ST(0x1001). SSLv3 write client key exchange A. R(0x1)U ST(0x1001). SSLv3 write change cipher spec A. R(0x1)U ST(0x1001). SSLv3 write finished A. R(0x1)U ST(0x1001). SSLv3 flush data. R(0x1)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1001). SSLv3 read server hello A. R(0x1)U ST(0x1001). SSLv3 read server certificate A. R(0x1)U ST(0x1001). SSLv3 read server key exchange A. R(0x1)U ST(0x1001). SSLv3 read server done A. R(0x1)U ST(0x1001). SSLv3 write client key exchange A. R(0x1)U ST(0x1001). SSLv3 write change cipher spec A. R(0x1)U ST(0x1001). SSLv3 write finished A. R(0x1)U ST(0x1001). SSLv3 flush data. R(0x1)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1002). SSLv3 read server session ticket A. R(0xffffffff)U ST(0x1001). SSLv3 read server session ticket A. R(0x1)U ST(0x1001). SSLv3 read finished A. R(0x1)U ST(0x20). SSL negotiation finished successfully. R(0x1)U Using SSL version TLSv1.2. Cipher=ECDHE-RSA-AES256-GCM-SHA384 ST(0x1002). SSL negotiation finished successfully. R(0x1)U ST(0x1001). SSLv3 read server session ticket A. R(0x1)U ST(0x1001). SSLv3 read finished A. R(0x1)U ST(0x20). SSL negotiation finished successfully. R(0x1)U