+++ date ++ echo 'INFO: =================== Mon Sep 9 02:25:20 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:25:20 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ cut -d / -f 1 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ head -n 1 +++ grep 'inet ' +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ cat /proc/net/fib_trie ++++ grep -vi host ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ uniq ++++ tr '\n' , +++ cut -d ' ' -f 1 +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:25:27.575 7f3140b1af20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:25:27.663 7f3140b1af20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:25:27.685 7f3140b1af20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:25:27.685 7f3140b1af20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:25:28 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:25:28 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ awk '{print $2}' +++ head -n 1 +++ grep 'inet ' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ grep -vi host ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ set ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:25:36.220 7f939b716f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:25:36.330 7f939b716f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:25:36.358 7f939b716f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:25:36.359 7f939b716f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:25:38 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:25:38 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ grep -o 'dev.*' +++++ ip route get 1 +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ awk '{print $2}' +++ head -n 1 +++ grep 'inet ' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ cut -d ' ' -f 1 +++ IFS=, +++ read -ra server_list ++++ tr '\n' , ++++ get_local_ips ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' ++ set -o posix ++ set + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:25:44.692 7fecf8a38f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:25:44.759 7fecf8a38f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:25:44.776 7fecf8a38f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:25:44.776 7fecf8a38f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:25:45 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:25:45 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ awk '{print $2}' +++++ grep -o 'dev.*' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ ip addr show dev ens3 +++ cut -d / -f 1 +++ head -n 1 +++ awk '{print $2}' +++ grep 'inet ' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ get_local_ips ++++ tr '\n' , ++++ grep -vi host ++++ sort ++++ uniq ++++ awk '/32 host/ { print f } {f=$2}' ++++ cat /proc/net/fib_trie +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sed 's/^ANALYTICS_API__//g' ++ cut -d = -f 1 ++ sort + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:25:53.442 7f03c8d70f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:25:53.650 7f03c8d70f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:25:53.675 7f03c8d70f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:25:53.675 7f03c8d70f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:25:55 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:25:55 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ awk '{print $2}' +++ grep 'inet ' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ cut -d , -f 1 ++ echo 10.0.0.55 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + nc -z 10.0.0.55 9041 + echo -e '\035\nquit' + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ cat /proc/net/fib_trie ++++ grep -vi host ++++ tr '\n' , ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ cut -d = -f 1 ++ sort ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:26:03.530 7f4e7ea35f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:26:03.679 7f4e7ea35f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:26:03.694 7f4e7ea35f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:26:03.695 7f4e7ea35f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:26:06 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:26:06 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ awk '{print $2}' +++++ grep -o 'dev.*' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ local nic=ens3 +++ cut -d / -f 1 +++ ip addr show dev ens3 +++ head -n 1 +++ grep 'inet ' +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ cat /proc/net/fib_trie ++++ grep -vi host ++++ sort ++++ tr '\n' , ++++ uniq ++++ awk '/32 host/ { print f } {f=$2}' +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:26:12.605 7f0b667eef20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:26:12.684 7f0b667eef20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:26:12.698 7f0b667eef20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:26:12.698 7f0b667eef20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:26:16 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:26:16 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ uniq ++++ grep -vi host +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' ++ set + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:26:23.280 7feeed4d7f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:26:23.378 7feeed4d7f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:26:23.409 7feeed4d7f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:26:23.409 7feeed4d7f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:26:30 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:26:30 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:26:37.283 7f8ddefc9f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:26:37.343 7f8ddefc9f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:26:37.357 7f8ddefc9f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:26:37.357 7f8ddefc9f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:26:51 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:26:51 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ ip addr show dev ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + nc -z 10.0.0.55 9041 + echo -e '\035\nquit' + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ cut -d ' ' -f 1 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ grep -vi host ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ cut -d = -f 1 ++ sort ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:26:57.401 7f54c58d0f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:26:57.472 7f54c58d0f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:26:57.492 7f54c58d0f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:26:57.493 7f54c58d0f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:27:23 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:27:23 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ cut -d / -f 1 +++ command -v ip +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ sed 's/^ANALYTICS_API__//g' ++ cut -d = -f 1 + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:27:30.334 7f0eafd93f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:27:30.416 7f0eafd93f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:27:30.439 7f0eafd93f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:27:30.439 7f0eafd93f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:28:22 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:28:22 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ awk '{print $2}' +++++ grep -o 'dev.*' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ cut -d , -f 1 ++ echo 10.0.0.55 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ grep -vi host ++++ awk '/32 host/ { print f } {f=$2}' ++++ uniq ++++ sort +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ set ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:28:29.102 7f92fc801f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:28:29.185 7f92fc801f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:28:29.201 7f92fc801f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:28:29.201 7f92fc801f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:29:29 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:29:29 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ cut -d / -f 1 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:29:36.012 7f12755cff20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:29:36.081 7f12755cff20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:29:36.096 7f12755cff20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:29:36.096 7f12755cff20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:30:36 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:30:36 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ cut -d / -f 1 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ sed 's/^ANALYTICS_API__//g' ++ cut -d = -f 1 + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:30:42.985 7f8be0606f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:30:43.067 7f8be0606f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:30:43.081 7f8be0606f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:30:43.081 7f8be0606f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:31:43 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:31:43 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:31:49.817 7f8fc5168f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:31:49.900 7f8fc5168f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:31:49.914 7f8fc5168f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:31:49.914 7f8fc5168f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:32:50 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:32:50 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ grep -vi host ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:32:56.957 7f2cc1d6af20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:32:57.029 7f2cc1d6af20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:32:57.043 7f2cc1d6af20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:32:57.043 7f2cc1d6af20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:33:57 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:33:57 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ awk '{print $2}' +++++ grep -o 'dev.*' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ cut -d , -f 1 ++ echo 10.0.0.55 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ cut -d ' ' -f 1 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ uniq ++++ sort +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ sort ++ sed 's/^ANALYTICS_API__//g' ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ cut -d = -f 1 + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:34:03.910 7f1ceea33f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:34:03.973 7f1ceea33f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:34:03.986 7f1ceea33f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:34:03.987 7f1ceea33f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:35:04 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:35:04 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ grep -vi host ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ set ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:35:10.795 7fdef42a8f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:35:10.887 7fdef42a8f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:35:10.903 7fdef42a8f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:35:10.903 7fdef42a8f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:36:11 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:36:11 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ cut -d / -f 1 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ uniq ++++ sort +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ set -o posix ++ cut -d = -f 1 ++ set ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:36:18.140 7f33414fbf20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:36:18.197 7f33414fbf20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:36:18.209 7f33414fbf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:36:18.210 7f33414fbf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:37:18 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:37:18 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ grep -o 'dev.*' +++++ ip route get 1 +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ cut -d / -f 1 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ tr '\n' , ++++ get_local_ips ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:37:24.947 7f2e9f8a5f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:37:25.027 7f2e9f8a5f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:37:25.041 7f2e9f8a5f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:37:25.042 7f2e9f8a5f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:38:25 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:38:25 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ sed 's/^ANALYTICS_API__//g' ++ cut -d = -f 1 + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:38:32.124 7f7b861c0f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:38:32.184 7f7b861c0f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:38:32.198 7f7b861c0f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:38:32.198 7f7b861c0f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:39:32 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:39:32 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ cut -d / -f 1 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ set -o posix ++ set ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:39:38.959 7f9c6184ef20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:39:39.024 7f9c6184ef20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:39:39.038 7f9c6184ef20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:39:39.038 7f9c6184ef20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:40:39 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:40:39 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ cut -d / -f 1 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ uniq ++++ grep -vi host +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:40:46.022 7f595d3fdf20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:40:46.101 7f595d3fdf20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:40:46.116 7f595d3fdf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:40:46.117 7f595d3fdf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:41:46 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:41:46 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ uniq ++++ sort +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:41:52.870 7f5c28cc1f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:41:52.945 7f5c28cc1f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:41:52.958 7f5c28cc1f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:41:52.958 7f5c28cc1f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:42:53 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:42:53 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ cut -d / -f 1 +++ command -v ip +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ tr '\n' , ++++ get_local_ips ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ uniq ++++ sort +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ sort ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ set ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:42:59.873 7fade9db7f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:42:59.955 7fade9db7f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:42:59.971 7fade9db7f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:42:59.971 7fade9db7f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:44:00 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:44:00 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ cut -d ' ' -f 1 +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ set ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:44:06.815 7ffbe4b65f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:44:06.883 7ffbe4b65f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:44:06.898 7ffbe4b65f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:44:06.898 7ffbe4b65f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:45:07 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:45:07 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ uniq ++++ grep -vi host +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:45:13.714 7f966744cf20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:45:13.793 7f966744cf20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:45:13.806 7f966744cf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:45:13.807 7f966744cf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:46:14 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:46:14 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + nc -z 10.0.0.55 9041 + echo -e '\035\nquit' + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:46:20.614 7ff44b2e5f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:46:20.674 7ff44b2e5f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:46:20.688 7ff44b2e5f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:46:20.688 7ff44b2e5f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:47:21 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:47:21 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ cut -d , -f 1 ++ echo 10.0.0.55 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ uniq ++++ grep -vi host +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:47:27.552 7f890baebf20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:47:27.614 7f890baebf20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:47:27.629 7f890baebf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:47:27.629 7f890baebf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:48:28 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:48:28 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:48:34.780 7f3951cf3f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:48:34.850 7f3951cf3f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:48:34.870 7f3951cf3f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:48:34.870 7f3951cf3f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:49:35 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:49:35 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:49:41.915 7f9600ea1f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:49:41.989 7f9600ea1f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:49:42.004 7f9600ea1f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:49:42.005 7f9600ea1f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:50:42 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:50:42 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ cut -d / -f 1 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' +++ ip addr show dev vhost0 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ cut -d ' ' -f 1 +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:50:48.916 7f211ab68f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:50:48.988 7f211ab68f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:50:49.004 7f211ab68f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:50:49.004 7f211ab68f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:51:49 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:51:49 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ cut -d / -f 1 +++ command -v ip +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:51:55.928 7f8ef7d23f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:51:55.991 7f8ef7d23f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:51:56.010 7f8ef7d23f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:51:56.010 7f8ef7d23f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:52:56 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:52:56 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:53:02.774 7fc4f06e1f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:53:02.839 7fc4f06e1f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:53:02.855 7fc4f06e1f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:53:02.855 7fc4f06e1f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:54:03 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:54:03 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:54:09.694 7f70bbaacf20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:54:09.793 7f70bbaacf20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:54:09.810 7f70bbaacf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:54:09.810 7f70bbaacf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:55:10 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:55:10 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ cut -d / -f 1 +++ ip addr show dev vhost0 +++ awk '{print $2}' +++ grep 'inet ' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ tr '\n' , ++++ get_local_ips ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host +++ cut -d ' ' -f 1 ++++ uniq ++++ sort ++++ cat /proc/net/fib_trie +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ set -o posix ++ set ++ sort ++ sed 's/^ANALYTICS_API__//g' ++ cut -d = -f 1 + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:55:17.823 7f6af6941f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:55:17.893 7f6af6941f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:55:17.908 7f6af6941f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:55:17.909 7f6af6941f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:56:18 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:56:18 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ awk '{print $2}' +++++ grep -o 'dev.*' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ cut -d / -f 1 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ sort ++++ uniq ++++ grep -vi host +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ set ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:56:24.937 7f0f6119df20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:56:25.012 7f0f6119df20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:56:25.029 7f0f6119df20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:56:25.029 7f0f6119df20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:57:25 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:57:25 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ uniq ++++ sort +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ cut -d = -f 1 ++ sort ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:57:32.140 7f08bee81f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:57:32.196 7f08bee81f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:57:32.209 7f08bee81f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:57:32.210 7f08bee81f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:58:32 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:58:32 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ cut -d ' ' -f 1 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:58:38.949 7fee556c3f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:58:39.038 7fee556c3f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:58:39.052 7fee556c3f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:58:39.052 7fee556c3f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 02:59:39 UTC 2024 ===================' INFO: =================== Mon Sep 9 02:59:39 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ awk '{print $2}' +++++ grep -o 'dev.*' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ cut -d / -f 1 +++ command -v ip +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' ++ set + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 02:59:45.984 7fa5098d4f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 02:59:46.043 7fa5098d4f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 02:59:46.057 7fa5098d4f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 02:59:46.057 7fa5098d4f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 03:00:46 UTC 2024 ===================' INFO: =================== Mon Sep 9 03:00:46 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ awk '{print $2}' +++++ grep -o 'dev.*' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 03:00:52.866 7f78d90c6f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 03:00:52.939 7f78d90c6f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 03:00:52.954 7f78d90c6f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 03:00:52.954 7f78d90c6f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 03:01:53 UTC 2024 ===================' INFO: =================== Mon Sep 9 03:01:53 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ cut -d / -f 1 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ cut -d ' ' -f 1 +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ grep -vi host ++++ uniq ++++ sort ++++ awk '/32 host/ { print f } {f=$2}' +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ cut -d = -f 1 ++ sort ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 03:02:00.273 7f5de840ef20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 03:02:00.342 7f5de840ef20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 03:02:00.358 7f5de840ef20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 03:02:00.358 7f5de840ef20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 03:03:00 UTC 2024 ===================' INFO: =================== Mon Sep 9 03:03:00 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ cut -d / -f 1 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ cut -d ' ' -f 1 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ set ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 03:03:07.284 7f6746849f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 03:03:07.362 7f6746849f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 03:03:07.376 7f6746849f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 03:03:07.376 7f6746849f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 03:04:07 UTC 2024 ===================' INFO: =================== Mon Sep 9 03:04:07 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ cut -d / -f 1 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ head -n 1 +++ awk '{print $2}' ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ local server_list= +++ IFS=, +++ read -ra server_list +++ cut -d ' ' -f 1 ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ sort ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 03:04:14.177 7f5cffa0df20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 03:04:14.242 7f5cffa0df20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 03:04:14.256 7f5cffa0df20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 03:04:14.256 7f5cffa0df20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 03:05:14 UTC 2024 ===================' INFO: =================== Mon Sep 9 03:05:14 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ cut -d / -f 1 +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ cut -d ' ' -f 1 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ set ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 03:05:21.198 7fd28fc3bf20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 03:05:21.262 7fd28fc3bf20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 03:05:21.276 7fd28fc3bf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 03:05:21.276 7fd28fc3bf20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit. +++ date ++ echo 'INFO: =================== Mon Sep 9 03:06:22 UTC 2024 ===================' INFO: =================== Mon Sep 9 03:06:22 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=vhost0 ++++ [[ vhost0 == \l\o ]] ++++ echo vhost0 +++ local nic=vhost0 +++ get_ip_for_nic vhost0 +++ local nic=vhost0 +++ cut -d / -f 1 +++ get_cidr_for_nic vhost0 +++ command -v ip +++ local nic=vhost0 +++ ip addr show dev vhost0 +++ grep 'inet ' +++ awk '{print $2}' +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.55 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.55 ++ ANALYTICS_ALARM_ENABLE=True ++ ANALYTICS_SNMP_ENABLE=True ++ ANALYTICSDB_ENABLE=True ++ ANALYTICS_NODES=10.0.0.55 ++ ANALYTICSDB_NODES=10.0.0.55 ++ ANALYTICS_SNMP_NODES=10.0.0.55 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8081 ' +++ '[' -n '10.0.0.55:8081 ' ']' +++ echo 10.0.0.55:8081 ++ ANALYTICS_SERVERS=10.0.0.55:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9042 ' +++ '[' -n '10.0.0.55:9042 ' ']' +++ echo 10.0.0.55:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.55:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.55 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8086 ' +++ '[' -n '10.0.0.55:8086 ' ']' +++ echo 10.0.0.55:8086 ++ COLLECTOR_SERVERS=10.0.0.55:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.55 ++ CONFIGDB_NODES=10.0.0.55 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:8082 ' +++ '[' -n '10.0.0.55:8082 ' ']' +++ echo 10.0.0.55:8082 ++ CONFIG_SERVERS=10.0.0.55:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9161 ' +++ '[' -n '10.0.0.55:9161 ' ']' +++ echo 10.0.0.55:9161 ++ CONFIGDB_SERVERS=10.0.0.55:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9041 ' +++ '[' -n '10.0.0.55:9041 ' ']' +++ echo 10.0.0.55:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.55:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.55 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.55 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.55 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:2181, +++ '[' -n 10.0.0.55:2181, ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS=10.0.0.55:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:2181 ' +++ '[' -n '10.0.0.55:2181 ' ']' +++ echo 10.0.0.55:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.55:2181 ++ RABBITMQ_NODES=10.0.0.55 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+=10.0.0.55:5673, +++ '[' -n 10.0.0.55:5673, ']' +++ echo 10.0.0.55:5673 ++ RABBITMQ_SERVERS=10.0.0.55:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:6379 ' +++ '[' -n '10.0.0.55:6379 ' ']' +++ echo 10.0.0.55:6379 ++ REDIS_SERVERS=10.0.0.55:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.55 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.55 +++ local server_address=10.0.0.55 +++ extended_server_list+='10.0.0.55:9092 ' +++ '[' -n '10.0.0.55:9092 ' ']' +++ echo 10.0.0.55:9092 ++ KAFKA_SERVERS=10.0.0.55:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.55.118.165 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.55 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.55 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + pre_start_init + wait_certs_if_ssl_enabled + is_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem + local file1=/etc/contrail/ssl/certs/server.pem + local file2=/etc/contrail/ssl/private/server-privkey.pem + printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem' INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem' + local 'cmd=test -f /etc/contrail/ssl/certs/server.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/certs/server.pem + return 0 + wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem' + local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem' + local interval=3 + local max=20 + local i=0 + test -f /etc/contrail/ssl/private/server-privkey.pem + return 0 + echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present' INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_redis_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_analytics_api_certs_if_ssl_enabled + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]] + wait_for_cassandra ++ echo 10.0.0.55 ++ cut -d , -f 1 + local cassandra=10.0.0.55 + (( i=1 )) + (( i<=30 )) + echo -e '\035\nquit' + nc -z 10.0.0.55 9041 + echo 'INFO: Cassandra is connected' INFO: Cassandra is connected + sleep 5 + return 0 ++ get_listen_ip_for_node ANALYTICS +++ find_my_ip_and_order_for_node ANALYTICS +++ local server_typ=ANALYTICS_NODES +++ find_my_ip_and_order_for_node_list 10.0.0.55 +++ local servers=10.0.0.55 +++ cut -d ' ' -f 1 +++ local server_list= +++ IFS=, +++ read -ra server_list ++++ get_local_ips ++++ tr '\n' , ++++ cat /proc/net/fib_trie ++++ awk '/32 host/ { print f } {f=$2}' ++++ grep -vi host ++++ sort ++++ uniq +++ local local_ips=,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, +++ local ord=1 +++ for server in '"${server_list[@]}"' +++ local ret=0 ++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.55'\''))' +++ local server_ip=10.0.0.55 +++ [[ 0 == 0 ]] +++ [[ -n 10.0.0.55 ]] +++ [[ ,10.0.0.55,10.219.120.1,127.0.0.1,172.17.0.1,252.55.0.1,, =~ ,10\.0\.0\.55, ]] +++ echo 10.0.0.55 1 +++ return ++ local ip=10.0.0.55 ++ [[ -z 10.0.0.55 ]] ++ echo 10.0.0.55 + host_ip=10.0.0.55 + mkdir -p /etc/contrail + cat ++ get_introspect_listen_ip_for_node ANALYTICS ++ local ip=0.0.0.0 ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ echo 0.0.0.0 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + add_ini_params_from_env ANALYTICS_API /etc/contrail/contrail-analytics-api.conf + local service_name=ANALYTICS_API + local cfg_path=/etc/contrail/contrail-analytics-api.conf + local delim=__ ++ set -o posix ++ grep '^ANALYTICS_API__.*__.*=.*$' ++ set ++ sort ++ cut -d = -f 1 ++ sed 's/^ANALYTICS_API__//g' + local vars= + local section= + set_third_party_auth_config + [[ keystone != \k\e\y\s\t\o\n\e ]] + local tmp_file=/etc/contrail/contrail-keystone-auth.conf.tmp + cat + [[ /v3 == \/\v\3 ]] + cat + [[ http == \h\t\t\p\s ]] + [[ -n '' ]] + [[ -n '' ]] + [[ -n public ]] + echo 'interface = public' + mv -f /etc/contrail/contrail-keystone-auth.conf.tmp /etc/contrail/contrail-keystone-auth.conf + set_vnc_api_lib_ini + local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + [[ keystone == \k\e\y\s\t\o\n\e ]] + cat + [[ http == \h\t\t\p\s ]] + mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini + upgrade_old_logs analytics-api + local template=analytics-api ++ dirname /var/log/contrail/analytics-api + local old_dir=/var/log/contrail + mkdir -p /var/log/contrail/analytics-api + chmod 755 /var/log/contrail/analytics-api + mv -n '/var/log/contrail/*analytics-api.log*' /var/log/contrail/analytics-api/ + true + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + chown 1999:1999 /var/log/contrail/analytics-api + find /var/log/contrail/analytics-api -uid 0 -exec chown 1999:1999 '{}' + + run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + local owner_opts=1999:1999 + mkdir -p /etc/contrail /var/lib/contrail + chown 1999:1999 /etc/contrail /var/lib/contrail + find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' + + chmod 755 /etc/contrail + do_run_service /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf + [[ -n 1999 ]] + [[ -n 1999 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 1999 + local user_name=contrail + export HOME=/home/contrail + HOME=/home/contrail + mkdir -p /home/contrail + chown -R 1999:1999 /home/contrail + exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/contrail-analytics-api -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf 09/09/2024 03:06:28.825 7fdb432c2f20 [contrail-analytics-api] [INFO]: SANDESH: CONNECT TO COLLECTOR: True 09/09/2024 03:06:28.903 7fdb432c2f20 [contrail-analytics-api] [INFO]: SANDESH: INTROSPECT IS ON: 0.0.0.0:8090 09/09/2024 03:06:28.917 7fdb432c2f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: LEVEL: [SYS_INFO] -> [SYS_DEBUG] 09/09/2024 03:06:28.918 7fdb432c2f20 [contrail-analytics-api] [INFO]: SANDESH: Logging: FILE: [None] -> [/var/log/contrail/analytics-api/contrail-analytics-api.log] -c /etc/contrail/contrail-analytics-api.conf -c /etc/contrail/contrail-keystone-auth.conf Traceback (most recent call last): File "/usr/bin/contrail-analytics-api", line 33, in sys.exit(load_entry_point('opserver==0.1.dev0', 'console_scripts', 'contrail-analytics-api')()) File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2758, in main opserver.run() File "/usr/lib/python3.6/site-packages/opserver/opserver.py", line 2625, in run self._local_app = LocalApp(bottle.app(), self._args.auth_conf_info) File "/usr/lib/python3.6/site-packages/opserver/opserver_local.py", line 46, in __init__ self._http_app.config.local_auth = True AttributeError: 'ConfigDict' object has no attribute 'local_auth' Bottle v0.13.1 server starting up (using ContrailGeventServer())... Listening on http://10.0.0.55:8081/ Hit Ctrl-C to quit.