+++ date
++ echo 'INFO: =================== Thu Apr 17 02:08:05 UTC 2025 ==================='
INFO: =================== Thu Apr 17 02:08:05 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.242
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=True
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.242
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.242
++ ANALYTICSDB_NODES=10.0.0.242
++ ANALYTICS_SNMP_NODES=10.0.0.242
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:8081 '
+++ '[' -n '10.0.0.242:8081 ' ']'
+++ echo 10.0.0.242:8081
++ ANALYTICS_SERVERS=10.0.0.242:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:9042 '
+++ '[' -n '10.0.0.242:9042 ' ']'
+++ echo 10.0.0.242:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.242:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.242
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:8086 '
+++ '[' -n '10.0.0.242:8086 ' ']'
+++ echo 10.0.0.242:8086
++ COLLECTOR_SERVERS=10.0.0.242:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.242
++ CONFIGDB_NODES=10.0.0.242
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:8082 '
+++ '[' -n '10.0.0.242:8082 ' ']'
+++ echo 10.0.0.242:8082
++ CONFIG_SERVERS=10.0.0.242:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:9161 '
+++ '[' -n '10.0.0.242:9161 ' ']'
+++ echo 10.0.0.242:9161
++ CONFIGDB_SERVERS=10.0.0.242:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:9041 '
+++ '[' -n '10.0.0.242:9041 ' ']'
+++ echo 10.0.0.242:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.242:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=True
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=True
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=True
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.242
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.242
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.242
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+=10.0.0.242:2181,
+++ '[' -n 10.0.0.242:2181, ']'
+++ echo 10.0.0.242:2181
++ ZOOKEEPER_SERVERS=10.0.0.242:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:2181 '
+++ '[' -n '10.0.0.242:2181 ' ']'
+++ echo 10.0.0.242:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.242:2181
++ RABBITMQ_NODES=10.0.0.242
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+=10.0.0.242:5673,
+++ '[' -n 10.0.0.242:5673, ']'
+++ echo 10.0.0.242:5673
++ RABBITMQ_SERVERS=10.0.0.242:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=True
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:6379 '
+++ '[' -n '10.0.0.242:6379 ' ']'
+++ echo 10.0.0.242:6379
++ REDIS_SERVERS=10.0.0.242:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=True
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' redis_ssl_config
++ true
++ KAFKA_NODES=10.0.0.242
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:9092 '
+++ '[' -n '10.0.0.242:9092 ' ']'
+++ echo 10.0.0.242:9092
++ KAFKA_SERVERS=10.0.0.242:9092
++ KAFKA_SSL_ENABLE=True
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=password
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=252.242.147.243
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5050
++ KEYSTONE_AUTH_PUBLIC_PORT=5050
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.242
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=password
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.242
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=True
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=True
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=True
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password password'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' xmpp_certs_config
++ true
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' analytics_api_ssl_opts
++ true
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' rabbitmq_ssl_config
++ true
++ read -r -d '' kombu_ssl_config
++ true
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' kafka_ssl_config
++ true
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ wait_files /etc/contrail/ssl/certs/server.pem /etc/contrail/ssl/private/server-privkey.pem
+ local file1=/etc/contrail/ssl/certs/server.pem
+ local file2=/etc/contrail/ssl/private/server-privkey.pem
+ printf 'INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem'
INFO: wait for files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem+ wait_cmd_success 'test -f /etc/contrail/ssl/certs/server.pem'
+ local 'cmd=test -f /etc/contrail/ssl/certs/server.pem'
+ local interval=3
+ local max=20
+ local i=0
+ test -f /etc/contrail/ssl/certs/server.pem
+ return 0
+ wait_cmd_success 'test -f /etc/contrail/ssl/private/server-privkey.pem'
+ local 'cmd=test -f /etc/contrail/ssl/private/server-privkey.pem'
+ local interval=3
+ local max=20
+ local i=0
+ test -f /etc/contrail/ssl/private/server-privkey.pem
+ return 0
+ echo -e '\nINFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present'

INFO: files /etc/contrail/ssl/certs/server.pem and /etc/contrail/ssl/private/server-privkey.pem are present
+ [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]]
+ [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]]
+ [[ /etc/contrail/ssl/private/server-privkey.pem != \/\e\t\c\/\c\o\n\t\r\a\i\l\/\s\s\l\/\p\r\i\v\a\t\e\/\s\e\r\v\e\r\-\p\r\i\v\k\e\y\.\p\e\m ]]
++ get_listen_ip_for_node WEBUI
+++ find_my_ip_and_order_for_node WEBUI
+++ local server_typ=WEBUI_NODES
+++ find_my_ip_and_order_for_node_list 10.0.0.242
+++ local servers=10.0.0.242
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ cut -d ' ' -f 1
++++ get_local_ips
++++ tr '\n' ,
++++ cat /proc/net/fib_trie
++++ awk '/32 host/ { print f } {f=$2}'
++++ grep -vi host
++++ sort
++++ uniq
+++ local local_ips=,10.0.0.242,10.49.126.1,127.0.0.1,172.17.0.1,252.242.0.1,,
+++ local ord=1
+++ for server in '"${server_list[@]}"'
+++ local ret=0
++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.242'\''))'
+++ local server_ip=10.0.0.242
+++ [[ 0 == 0 ]]
+++ [[ -n 10.0.0.242 ]]
+++ [[ ,10.0.0.242,10.49.126.1,127.0.0.1,172.17.0.1,252.242.0.1,, =~ ,10\.0\.0\.242, ]]
+++ echo 10.0.0.242 1
+++ return
++ local ip=10.0.0.242
++ [[ -z 10.0.0.242 ]]
++ echo 10.0.0.242
+ host_ip=10.0.0.242
+ init_tls
+ SSL_ENABLE=true
+ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
+ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
+ SERVER_CA_KEYFILE=
+ SERVER_CA_CERTFILE=
+ /certs-init.sh
++ LOG_DIR=/var/log/contrail
++ export CONTAINER_LOG_DIR=/var/log/contrail/webui-web
++ CONTAINER_LOG_DIR=/var/log/contrail/webui-web
++ mkdir -p /var/log/contrail/webui-web
++ log_file=/var/log/contrail/webui-web/console.log
++ touch /var/log/contrail/webui-web/console.log
++ chmod 600 /var/log/contrail/webui-web/console.log
++ exec
+++ tee -a /var/log/contrail/webui-web/console.log
+++ date
+++ date
++ echo 'INFO: =================== Thu Apr 17 02:08:05 UTC 2025 ==================='
++ echo 'INFO: =================== Thu Apr 17 02:08:05 UTC 2025 ==================='
INFO: =================== Thu Apr 17 02:08:05 UTC 2025 ===================
INFO: =================== Thu Apr 17 02:08:05 UTC 2025 ===================
++ LOG_LOCAL=1
++ LOG_LOCAL=1
++ source /functions.sh
++ source /functions.sh
++ source /contrail-functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ cut -d / -f 1
+++ cut -d / -f 1
+++ get_cidr_for_nic ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ command -v ip
+++ local nic=ens3
+++ local nic=ens3
+++ grep 'inet '
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
+++ awk '{print $2}'
+++ head -n 1
+++ ip addr show dev ens3
+++ ip addr show dev ens3
++ DEFAULT_LOCAL_IP=10.0.0.242
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ DEFAULT_LOCAL_IP=10.0.0.242
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=true
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SERVER_CA_CERTFILE=
++ SERVER_CA_KEYFILE=
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.242
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.242
++ ANALYTICSDB_NODES=10.0.0.242
++ ANALYTICS_SNMP_NODES=10.0.0.242
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=0
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 0 ]]
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=noauth
++ AUTH_PARAMS=
++ SSL_ENABLE=true
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SERVER_CA_CERTFILE=
++ SERVER_CA_KEYFILE=
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.242
++ ANALYTICS_ALARM_ENABLE=False
++ ANALYTICS_SNMP_ENABLE=False
++ ANALYTICSDB_ENABLE=False
++ ANALYTICS_NODES=10.0.0.242
++ ANALYTICSDB_NODES=10.0.0.242
++ ANALYTICS_SNMP_NODES=10.0.0.242
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ local server_list=
+++ IFS=,
+++ IFS=,
+++ read -ra server_list
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:8081 '
+++ '[' -n '10.0.0.242:8081 ' ']'
+++ echo 10.0.0.242:8081
+++ extended_server_list+='10.0.0.242:8081 '
+++ '[' -n '10.0.0.242:8081 ' ']'
+++ echo 10.0.0.242:8081
++ ANALYTICS_SERVERS=10.0.0.242:8081
++ ANALYTICS_SERVERS=10.0.0.242:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ local server_list=
+++ IFS=,
+++ IFS=,
+++ read -ra server_list
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:9042 '
+++ extended_server_list+='10.0.0.242:9042 '
+++ '[' -n '10.0.0.242:9042 ' ']'
+++ '[' -n '10.0.0.242:9042 ' ']'
+++ echo 10.0.0.242:9042
+++ echo 10.0.0.242:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.242:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.242
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ ANALYTICSDB_CQL_SERVERS=10.0.0.242:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.242
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:8086 '
+++ extended_server_list+='10.0.0.242:8086 '
+++ '[' -n '10.0.0.242:8086 ' ']'
+++ '[' -n '10.0.0.242:8086 ' ']'
+++ echo 10.0.0.242:8086
+++ echo 10.0.0.242:8086
++ COLLECTOR_SERVERS=10.0.0.242:8086
++ COLLECTOR_SERVERS=10.0.0.242:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.242
++ CONFIG_NODES=10.0.0.242
++ CONFIGDB_NODES=10.0.0.242
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
++ CONFIGDB_NODES=10.0.0.242
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ get_server_list CONFIG ':8082 '
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ local server_typ=CONFIG_NODES
+++ IFS=,
+++ read -ra server_list
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:8082 '
+++ '[' -n '10.0.0.242:8082 ' ']'
+++ local server_address=10.0.0.242
+++ echo 10.0.0.242:8082
+++ extended_server_list+='10.0.0.242:8082 '
+++ '[' -n '10.0.0.242:8082 ' ']'
+++ echo 10.0.0.242:8082
++ CONFIG_SERVERS=10.0.0.242:8082
++ CONFIG_SERVERS=10.0.0.242:8082
+++ get_server_list CONFIGDB ':9161 '
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ local server_list=
+++ IFS=,
+++ IFS=,
+++ read -ra server_list
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:9161 '
+++ local server_address=10.0.0.242
+++ '[' -n '10.0.0.242:9161 ' ']'
+++ extended_server_list+='10.0.0.242:9161 '
+++ echo 10.0.0.242:9161
+++ '[' -n '10.0.0.242:9161 ' ']'
+++ echo 10.0.0.242:9161
++ CONFIGDB_SERVERS=10.0.0.242:9161
++ CONFIGDB_SERVERS=10.0.0.242:9161
+++ get_server_list CONFIGDB ':9041 '
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ local server_list=
+++ IFS=,
+++ IFS=,
+++ read -ra server_list
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:9041 '
+++ '[' -n '10.0.0.242:9041 ' ']'
+++ local server_address=10.0.0.242
+++ echo 10.0.0.242:9041
+++ extended_server_list+='10.0.0.242:9041 '
+++ '[' -n '10.0.0.242:9041 ' ']'
+++ echo 10.0.0.242:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.242:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=True
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ CONFIG_API_SERVER_CA_CERTFILE=
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=True
++ ANALYTICS_API_SSL_INSECURE=True
++ CONFIGDB_CQL_SERVERS=10.0.0.242:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=True
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ CONFIG_API_SERVER_CA_CERTFILE=
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=True
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=
++ CASSANDRA_SSL_ENABLE=True
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ CASSANDRA_SSL_CA_CERTFILE=
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.242
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.242
++ DNS_SERVER_PORT=53
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=
++ CASSANDRA_SSL_ENABLE=True
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ CASSANDRA_SSL_CA_CERTFILE=
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.0.0.242
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.0.0.242
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.242
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.242
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local port_with_delim=:2181,
+++ local server_list=
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+=10.0.0.242:2181,
+++ extended_server_list+=10.0.0.242:2181,
+++ '[' -n 10.0.0.242:2181, ']'
+++ '[' -n 10.0.0.242:2181, ']'
+++ echo 10.0.0.242:2181
+++ echo 10.0.0.242:2181
++ ZOOKEEPER_SERVERS=10.0.0.242:2181
++ ZOOKEEPER_SERVERS=10.0.0.242:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ get_server_list ZOOKEEPER ':2181 '
+++ local 'port_with_delim=:2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local server_list=
+++ IFS=,
+++ local 'port_with_delim=:2181 '
+++ read -ra server_list
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:2181 '
+++ '[' -n '10.0.0.242:2181 ' ']'
+++ extended_server_list+='10.0.0.242:2181 '
+++ '[' -n '10.0.0.242:2181 ' ']'
+++ echo 10.0.0.242:2181
+++ echo 10.0.0.242:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.242:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.242:2181
++ RABBITMQ_NODES=10.0.0.242
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
++ RABBITMQ_NODES=10.0.0.242
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+=10.0.0.242:5673,
+++ '[' -n 10.0.0.242:5673, ']'
+++ echo 10.0.0.242:5673
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+=10.0.0.242:5673,
+++ '[' -n 10.0.0.242:5673, ']'
+++ echo 10.0.0.242:5673
++ RABBITMQ_SERVERS=10.0.0.242:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ RABBITMQ_SSL_CACERTFILE=
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=True
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
++ RABBITMQ_SERVERS=10.0.0.242:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ RABBITMQ_SSL_CACERTFILE=
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=True
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ local server_list=
+++ IFS=,
+++ IFS=,
+++ read -ra server_list
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:6379 '
+++ '[' -n '10.0.0.242:6379 ' ']'
+++ local server_address=10.0.0.242
+++ echo 10.0.0.242:6379
+++ extended_server_list+='10.0.0.242:6379 '
+++ '[' -n '10.0.0.242:6379 ' ']'
+++ echo 10.0.0.242:6379
++ REDIS_SERVERS=10.0.0.242:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=True
++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ REDIS_SSL_CACERTFILE=
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' redis_ssl_config
++ REDIS_SERVERS=10.0.0.242:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=True
++ REDIS_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ REDIS_SSL_CACERTFILE=
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' redis_ssl_config
++ true
++ KAFKA_NODES=10.0.0.242
++ KAFKA_PORT=9092
++ true
++ KAFKA_NODES=10.0.0.242
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ local server_list=
+++ IFS=,
+++ IFS=,
+++ read -ra server_list
+++ read -ra server_list
+++ local extended_server_list=
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.242
++++ echo 10.0.0.242
+++ local server_address=10.0.0.242
+++ local server_address=10.0.0.242
+++ extended_server_list+='10.0.0.242:9092 '
+++ extended_server_list+='10.0.0.242:9092 '
+++ '[' -n '10.0.0.242:9092 ' ']'
+++ '[' -n '10.0.0.242:9092 ' ']'
+++ echo 10.0.0.242:9092
+++ echo 10.0.0.242:9092
++ KAFKA_SERVERS=10.0.0.242:9092
++ KAFKA_SSL_ENABLE=true
++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ KAFKA_SSL_CACERTFILE=
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=password
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=252.242.147.243
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5050
++ KEYSTONE_AUTH_PUBLIC_PORT=5050
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.242
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=password
++ KAFKA_SERVERS=10.0.0.242:9092
++ KAFKA_SSL_ENABLE=true
++ KAFKA_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ KAFKA_SSL_CACERTFILE=
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=password
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=252.242.147.243
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5050
++ KEYSTONE_AUTH_PUBLIC_PORT=5050
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.242
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ AGENT_MODE=kernel
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=password
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ EXTERNAL_ROUTERS=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ SUBCLUSTER=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_MODULE_OPTIONS=
++ VROUTER_DECRYPT_KEY=15
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ VROUTER_MODULE_OPTIONS=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ QOS_QUEUE_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_LOGICAL_QUEUES=
++ QOS_QUEUE_ID=
++ QOS_DEF_HW_QUEUE=False
++ QOS_LOGICAL_QUEUES=
++ PRIORITY_TAGGING=True
++ QOS_DEF_HW_QUEUE=False
++ SLO_DESTINATION=collector
++ PRIORITY_TAGGING=True
++ '[' -n '' ']'
++ SLO_DESTINATION=collector
++ SAMPLE_DESTINATION=collector
++ '[' -n '' ']'
++ FLOW_EXPORT_RATE=0
++ SAMPLE_DESTINATION=collector
++ WEBUI_NODES=10.0.0.242
++ WEBUI_JOB_SERVER_PORT=3000
++ FLOW_EXPORT_RATE=0
++ KUE_UI_PORT=3002
++ WEBUI_NODES=10.0.0.242
++ WEBUI_JOB_SERVER_PORT=3000
++ WEBUI_HTTP_LISTEN_PORT=8180
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SSL_ENABLE=true
++ XMPP_SERVER_PORT=5269
++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ XMPP_SSL_ENABLE=true
++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ XMPP_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ XMPP_SERVER_CA_CERTFILE=
++ XMPP_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ XMPP_SERVER_CA_CERTFILE=
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ LINKLOCAL_SERVICE_NAME=metadata
++ IPFABRIC_SERVICE_PORT=8775
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ INTROSPECT_SSL_ENABLE=true
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=true
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ INTROSPECT_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ INTROSPECT_CA_CERTFILE=
++ INTROSPECT_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ INTROSPECT_LISTEN_ALL=True
++ INTROSPECT_CA_CERTFILE=
++ SANDESH_SSL_ENABLE=true
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SANDESH_SSL_ENABLE=true
++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SANDESH_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SANDESH_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ SANDESH_CA_CERTFILE=
++ SANDESH_SERVER_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ METADATA_SSL_ENABLE=false
++ SANDESH_CA_CERTFILE=
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ METADATA_SSL_CERT_TYPE=
++ CONTAINERD_NAMESPACE=k8s.io
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ TOR_AGENT_OVS_KA=10000
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_TYPE=ovs
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ TORAGENT_SSL_CERTFILE=/etc/contrail/webui_ssl/cs-cert.pem
++ TORAGENT_SSL_CACERTFILE=
++ TORAGENT_SSL_KEYFILE=/etc/contrail/webui_ssl/cs-key.pem
++ TORAGENT_SSL_CACERTFILE=
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ [[ /v3 == \/\v\2\.\0 ]]
++ AUTH_MODE=keystone
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password password'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_MODE=keystone
++ AUTH_PARAMS+=' --admin_user admin'
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password password'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' xmpp_certs_config
++ true
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' analytics_api_ssl_opts
++ true
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' rabbitmq_ssl_config
++ true
++ read -r -d '' kombu_ssl_config
++ true
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' kafka_ssl_config
++ true
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]]
+ [[ -z /etc/contrail/webui_ssl/cs-key.pem ]]
+ FORCE_GENERATE_CERT=false
+ [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]]
++ dirname /etc/contrail/webui_ssl/cs-cert.pem
+ cert_dir_name=/etc/contrail/webui_ssl
+ SERVER_CA_CERTFILE=/etc/contrail/webui_ssl/ca-cert.pem
+ mkdir -p /etc/contrail/webui_ssl
++ dirname /etc/contrail/webui_ssl/cs-key.pem
++ AUTH_PARAMS+=' --admin_user admin'
+ mkdir -p -m 750 /etc/contrail/webui_ssl
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' xmpp_certs_config
++ true
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' analytics_api_ssl_opts
++ true
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled True
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' rabbitmq_ssl_config
++ true
++ read -r -d '' kombu_ssl_config
++ true
++ is_enabled true
++ local val=true
++ [[ true == \t\r\u\e ]]
++ read -r -d '' kafka_ssl_config
++ true
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ CA_PRIVATE_KEY_BITS=4096
+ PRIVATE_KEY_BITS=2048
+ is_ssl_enabled
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ [[ -z /etc/contrail/webui_ssl/cs-cert.pem ]]
+ [[ -z /etc/contrail/webui_ssl/cs-key.pem ]]
+ FORCE_GENERATE_CERT=false
+ [[ -f /etc/contrail/webui_ssl/cs-cert.pem ]]
++ dirname /etc/contrail/webui_ssl/cs-cert.pem
+ cert_dir_name=/etc/contrail/webui_ssl
+ SERVER_CA_CERTFILE=/etc/contrail/webui_ssl/ca-cert.pem
+ mkdir -p /etc/contrail/webui_ssl
++ dirname /etc/contrail/webui_ssl/cs-key.pem
+ mkdir -p -m 750 /etc/contrail/webui_ssl
++ dirname /etc/contrail/webui_ssl/ca-cert.pem
++ dirname /etc/contrail/webui_ssl/ca-cert.pem
+ mkdir -p /etc/contrail/webui_ssl
+ mkdir -p /etc/contrail/webui_ssl
++ mktemp -p /etc/contrail/webui_ssl .lock.XXXXXXXX
++ mktemp -p /etc/contrail/webui_ssl .lock.XXXXXXXX
+ tmp_lock_name=/etc/contrail/webui_ssl/.lock.UhSmdkBC
+ lock_file_name=/etc/contrail/webui_ssl/cs-cert.pem.lock
+ mv /etc/contrail/webui_ssl/.lock.UhSmdkBC /etc/contrail/webui_ssl/cs-cert.pem.lock
+ tmp_lock_name=/etc/contrail/webui_ssl/.lock.UhSmdkBC
+ lock_file_name=/etc/contrail/webui_ssl/cs-cert.pem.lock
+ mv /etc/contrail/webui_ssl/.lock.UhSmdkBC /etc/contrail/webui_ssl/cs-cert.pem.lock
+ trap 'rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp' EXIT
+ trap 'rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp' EXIT
+ ca_provider=
+ ca_provider=
+ k8s_token_file=/var/run/secrets/kubernetes.io/serviceaccount/token
+ k8s_token_file=/var/run/secrets/kubernetes.io/serviceaccount/token
+ k8s_ca_file=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
+ k8s_ca_file=/var/run/secrets/kubernetes.io/serviceaccount/ca.crt
+ [[ -f /var/run/secrets/kubernetes.io/serviceaccount/token ]]
+ [[ -f /var/run/secrets/kubernetes.io/serviceaccount/token ]]
++ hostname -s
++ hostname -s
+ short_host_name=cn-jenkins-deploy-platform-juju-os-517-1
+ short_host_name=cn-jenkins-deploy-platform-juju-os-517-1
++ hostname -f
++ hostname -f
+ full_host_name=cn-jenkins-deploy-platform-juju-os-517-1
+ full_host_name=cn-jenkins-deploy-platform-juju-os-517-1
++ getent hosts
++ getent hosts
++ cut -d ' ' -f2-
++ xargs
++ cut -d ' ' -f2-
++ xargs
++ grep cn-jenkins-deploy-platform-juju-os-517-1
++ grep cn-jenkins-deploy-platform-juju-os-517-1
+ dns_names_all='cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1'
+ dns_names_all='cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1'
++ tr ' ' '\n'
++ echo 'cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1'
++ tr ' ' '\n'
++ echo 'cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1 cn-jenkins-deploy-platform-juju-os-517-1'
++ sort -u
++ sort -u
+ dns_names=cn-jenkins-deploy-platform-juju-os-517-1
+ alt_names=
+ alt_name_num=1
+ for n in '$dns_names'
+ '[' -z '' ']'
+ alt_names+='DNS.1 = cn-jenkins-deploy-platform-juju-os-517-1'
+ ((  alt_name_num+=1  ))
+ is_enabled True
+ dns_names=cn-jenkins-deploy-platform-juju-os-517-1
+ alt_names=
+ alt_name_num=1
+ for n in '$dns_names'
+ '[' -z '' ']'
+ alt_names+='DNS.1 = cn-jenkins-deploy-platform-juju-os-517-1'
+ ((  alt_name_num+=1  ))
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ alt_name_num=1
++ get_local_ips
+ local val=true
+ [[ true == \t\r\u\e ]]
+ alt_name_num=1
++ get_local_ips
++ cat /proc/net/fib_trie
++ cat /proc/net/fib_trie
++ awk '/32 host/ { print f } {f=$2}'
++ awk '/32 host/ { print f } {f=$2}'
++ uniq
++ uniq
++ grep -vi host
++ grep -vi host
++ sort
++ sort
+ for ip in '$(get_local_ips)'
+ [[ 10.0.0.242 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.1 = 10.0.0.242'
+ ((  alt_name_num+=1  ))
+ for ip in '$(get_local_ips)'
+ [[ 10.49.126.1 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.2 = 10.49.126.1'
+ ((  alt_name_num+=1  ))
+ for ip in '$(get_local_ips)'
+ [[ 127.0.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ for ip in '$(get_local_ips)'
+ [[ 172.17.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.3 = 172.17.0.1'
+ ((  alt_name_num+=1  ))
+ for ip in '$(get_local_ips)'
+ [[ 252.242.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.4 = 252.242.0.1'
+ ((  alt_name_num+=1  ))
+ working_dir=/tmp/contrail_ssl_gen
+ SERVER_CA_KEYFILE=/tmp/contrail_ssl_gen/certs/ca.key.pem
+ rm -rf /tmp/contrail_ssl_gen
+ for ip in '$(get_local_ips)'
+ [[ 10.0.0.242 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.1 = 10.0.0.242'
+ ((  alt_name_num+=1  ))
+ for ip in '$(get_local_ips)'
+ [[ 10.49.126.1 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.2 = 10.49.126.1'
+ ((  alt_name_num+=1  ))
+ for ip in '$(get_local_ips)'
+ [[ 127.0.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ for ip in '$(get_local_ips)'
+ [[ 172.17.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.3 = 172.17.0.1'
+ ((  alt_name_num+=1  ))
+ for ip in '$(get_local_ips)'
+ [[ 252.242.0.1 != \1\2\7\.\0\.\0\.\1 ]]
+ alt_names+='\nIP.4 = 252.242.0.1'
+ ((  alt_name_num+=1  ))
+ working_dir=/tmp/contrail_ssl_gen
+ SERVER_CA_KEYFILE=/tmp/contrail_ssl_gen/certs/ca.key.pem
+ rm -rf /tmp/contrail_ssl_gen
+ mkdir -p /tmp/contrail_ssl_gen/certs
+ touch /tmp/contrail_ssl_gen/index.txt /tmp/contrail_ssl_gen/index.txt.attr
+ mkdir -p /tmp/contrail_ssl_gen/certs
+ touch /tmp/contrail_ssl_gen/index.txt /tmp/contrail_ssl_gen/index.txt.attr
+ echo 01
+ openssl_config_file=/tmp/contrail_ssl_gen/contrail_openssl.cfg
+ cat
++ echo -e DNS.1 = 'cn-jenkins-deploy-platform-juju-os-517-1\nIP.1' = '10.0.0.242\nIP.2' = '10.49.126.1\nIP.3' = '172.17.0.1\nIP.4' = 252.242.0.1
+ echo 01
+ openssl_config_file=/tmp/contrail_ssl_gen/contrail_openssl.cfg
+ cat
++ echo -e DNS.1 = 'cn-jenkins-deploy-platform-juju-os-517-1\nIP.1' = '10.0.0.242\nIP.2' = '10.49.126.1\nIP.3' = '172.17.0.1\nIP.4' = 252.242.0.1
+ echo 'INFO: openssl config file'
INFO: openssl config file
+ cat /tmp/contrail_ssl_gen/contrail_openssl.cfg
+ echo 'INFO: openssl config file'
INFO: openssl config file
+ cat /tmp/contrail_ssl_gen/contrail_openssl.cfg
[req]
default_bits = 2048
prompt = no
default_md = sha256
default_days = 375
req_extensions = v3_req
distinguished_name = req_distinguished_name
x509_extensions = v3_ca

[ req_distinguished_name ]
commonName              = Contrail
countryName             = US
stateOrProvinceName     = CA
organizationName        = JuniperNetworks
organizationalUnitName  = JuniperCA
localityName            = Sunnyvale

[ v3_req ]
basicConstraints = CA:false
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = cn-jenkins-deploy-platform-juju-os-517-1
IP.1 = 10.0.0.242
IP.2 = 10.49.126.1
IP.3 = 172.17.0.1
IP.4 = 252.242.0.1

[ ca ]
default_ca = CA_default

[ CA_default ]
# Directory and file locations.
dir               = /tmp/contrail_ssl_gen
crl_dir           = $dir/crl
new_certs_dir     = $dir/certs
database          = $dir/index.txt
serial            = $dir/serial.txt
RANDFILE          = $dir/.rand
# For certificate revocation lists.
crlnumber         = $dir/crlnumber
crl               = $dir/crl/crl.pem
crl_extensions    = crl_ext
default_crl_days  = 30
# The root key and root certificate.
private_key       = /tmp/contrail_ssl_gen/certs/ca.key.pem
certificate       = /etc/contrail/webui_ssl/ca-cert.pem
# SHA-1 is deprecated, so use SHA-2 instead.
default_md        = sha256
name_opt          = ca_default
cert_opt          = ca_default
default_days      = 375
preserve          = no
policy            = policy_optional

[ policy_optional ]
countryName            = optional
stateOrProvinceName    = optional
organizationName       = optional
organizationalUnitName = optional
commonName             = supplied
emailAddress           = optional
localityName           = optional

[ v3_ca]
# Extensions for a typical CA
# PKIX recommendation.
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = CA:true

[ crl_ext ]
authorityKeyIdentifier=keyid:always,issuer:always
[req]
default_bits = 2048
prompt = no
default_md = sha256
default_days = 375
req_extensions = v3_req
distinguished_name = req_distinguished_name
x509_extensions = v3_ca

[ req_distinguished_name ]
commonName              = Contrail
countryName             = US
stateOrProvinceName     = CA
organizationName        = JuniperNetworks
organizationalUnitName  = JuniperCA
localityName            = Sunnyvale

[ v3_req ]
basicConstraints = CA:false
keyUsage = nonRepudiation, digitalSignature, keyEncipherment
subjectAltName = @alt_names

[ alt_names ]
DNS.1 = cn-jenkins-deploy-platform-juju-os-517-1
IP.1 = 10.0.0.242
IP.2 = 10.49.126.1
IP.3 = 172.17.0.1
IP.4 = 252.242.0.1

[ ca ]
default_ca = CA_default

[ CA_default ]
# Directory and file locations.
dir               = /tmp/contrail_ssl_gen
crl_dir           = $dir/crl
new_certs_dir     = $dir/certs
database          = $dir/index.txt
serial            = $dir/serial.txt
RANDFILE          = $dir/.rand
# For certificate revocation lists.
crlnumber         = $dir/crlnumber
crl               = $dir/crl/crl.pem
crl_extensions    = crl_ext
default_crl_days  = 30
# The root key and root certificate.
private_key       = /tmp/contrail_ssl_gen/certs/ca.key.pem
certificate       = /etc/contrail/webui_ssl/ca-cert.pem
# SHA-1 is deprecated, so use SHA-2 instead.
default_md        = sha256
name_opt          = ca_default
cert_opt          = ca_default
default_days      = 375
preserve          = no
policy            = policy_optional

[ policy_optional ]
countryName            = optional
stateOrProvinceName    = optional
organizationName       = optional
organizationalUnitName = optional
commonName             = supplied
emailAddress           = optional
localityName           = optional

[ v3_ca]
# Extensions for a typical CA
# PKIX recommendation.
subjectKeyIdentifier=hash
authorityKeyIdentifier=keyid:always,issuer:always
basicConstraints = CA:true

[ crl_ext ]
authorityKeyIdentifier=keyid:always,issuer:always
+ [[ '' != \k\u\b\e\r\n\e\t\e\s ]]
+ generate_local_ca
+ [[ ! -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]]
+ openssl genrsa -out /tmp/contrail_ssl_gen/certs/ca.key.pem 4096
+ [[ '' != \k\u\b\e\r\n\e\t\e\s ]]
+ generate_local_ca
+ [[ ! -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]]
+ openssl genrsa -out /tmp/contrail_ssl_gen/certs/ca.key.pem 4096
Generating RSA private key, 4096 bit long modulus
Generating RSA private key, 4096 bit long modulus
............................................................................................................................................................................................................................................................................++++

..............++++

e is 65537 (0x10001)
e is 65537 (0x10001)
++ dirname /tmp/contrail_ssl_gen/certs/ca.key.pem
++ dirname /tmp/contrail_ssl_gen/certs/ca.key.pem
+ chgrp -R contrail /tmp/contrail_ssl_gen/certs
+ chgrp -R contrail /tmp/contrail_ssl_gen/certs
+ chmod 640 /tmp/contrail_ssl_gen/certs/ca.key.pem
+ chmod 640 /tmp/contrail_ssl_gen/certs/ca.key.pem
+ openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -new -x509 -days 365 -extensions v3_ca -key /tmp/contrail_ssl_gen/certs/ca.key.pem -out /etc/contrail/webui_ssl/ca-cert.pem
+ openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -new -x509 -days 365 -extensions v3_ca -key /tmp/contrail_ssl_gen/certs/ca.key.pem -out /etc/contrail/webui_ssl/ca-cert.pem
+ chmod 644 /etc/contrail/webui_ssl/ca-cert.pem
+ chmod 644 /etc/contrail/webui_ssl/ca-cert.pem
++ dirname /etc/contrail/webui_ssl/ca-cert.pem
++ dirname /etc/contrail/webui_ssl/ca-cert.pem
+ chgrp -R contrail /etc/contrail/webui_ssl
+ chgrp -R contrail /etc/contrail/webui_ssl
+ [[ -f /etc/contrail/webui_ssl/ca-cert.pem ]]
+ [[ -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]]
+ csr_file=/tmp/contrail_ssl_gen/server.pem.csr
+ [[ -f /etc/contrail/webui_ssl/ca-cert.pem ]]
+ [[ -f /tmp/contrail_ssl_gen/certs/ca.key.pem ]]
+ csr_file=/tmp/contrail_ssl_gen/server.pem.csr
+ openssl genrsa -out /etc/contrail/webui_ssl/cs-key.pem.tmp 2048
+ openssl genrsa -out /etc/contrail/webui_ssl/cs-key.pem.tmp 2048
Generating RSA private key, 2048 bit long modulus
Generating RSA private key, 2048 bit long modulus
..................................................................................................++++++

..........................................................................................................................++++++

e is 65537 (0x10001)
e is 65537 (0x10001)
+ chmod 640 /etc/contrail/webui_ssl/cs-key.pem.tmp
+ chmod 640 /etc/contrail/webui_ssl/cs-key.pem.tmp
+ openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -key /etc/contrail/webui_ssl/cs-key.pem.tmp -new -out /tmp/contrail_ssl_gen/server.pem.csr
+ openssl req -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -key /etc/contrail/webui_ssl/cs-key.pem.tmp -new -out /tmp/contrail_ssl_gen/server.pem.csr
+ [[ '' != \k\u\b\e\r\n\e\t\e\s ]]
+ sign_csr_local_ca
+ yes
+ [[ '' != \k\u\b\e\r\n\e\t\e\s ]]
+ sign_csr_local_ca
+ yes
+ openssl ca -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -extensions v3_req -days 365 -in /tmp/contrail_ssl_gen/server.pem.csr -out /etc/contrail/webui_ssl/cs-cert.pem.tmp
+ openssl ca -config /tmp/contrail_ssl_gen/contrail_openssl.cfg -extensions v3_req -days 365 -in /tmp/contrail_ssl_gen/server.pem.csr -out /etc/contrail/webui_ssl/cs-cert.pem.tmp
Using configuration from /tmp/contrail_ssl_gen/contrail_openssl.cfg
Using configuration from /tmp/contrail_ssl_gen/contrail_openssl.cfg
Check that the request matches the signature
Check that the request matches the signature
Signature ok
Signature ok
Certificate Details:
Certificate Details:
        Serial Number:        Serial Number: 1 (0x1)
 1 (0x1)
        Validity
        Validity
            Not Before:             Not Before: Apr 17 02:08:06 2025 GMTApr 17 02:08:06 2025 GMT
            Not After : 
            Not After : Apr 17 02:08:06 2026 GMTApr 17 02:08:06 2026 GMT

        Subject:
        Subject:
                        countryNamecountryName                             =  = UUSS

                        stateOrProvinceNamestateOrProvinceName            =   = CCAA

                        organizationNameorganizationName                   =  = JJuunnipipererNeNettwoworkrks
s
                        organizationalUnitNameorganizationalUnitName      =   = JuJunniippererCCAA

                        commonName commonName                              = Contrail
            localityName              = Sunnyvale
        X509v3 extensions:
            X509v3 Basic Constraints: 
                CA:FALSE
            X509v3 Key Usage: 
                Digital Signature, Non Repudiation, Key Encipherment
            X509v3 Subject Alternative Name: 
 = Contrail
            localityName              = Sunnyvale
        X509v3 extensions:
            X509v3 Basic Constraints: 
                CA:FALSE
            X509v3 Key Usage: 
                Digital Signature, Non Repudiation, Key Encipherment
            X509v3 Subject Alternative Name: 
                                DNS:cn-jenkins-deploy-platform-juju-os-517-1DNS:cn-jenkins-deploy-platform-juju-os-517-1, , IP Address:10.0.0.242IP Address:10.0.0.242, IP Address:10.49.126.1, IP Address:10.49.126.1, , IP Address:172.17.0.1IP Address:172.17.0.1, , IP Address:252.242.0.1IP Address:252.242.0.1
Certificate is to be certified until 
Certificate is to be certified until Apr 17 02:08:06 2026 GMT (365 days)Apr 17 02:08:06 2026 GMT (365 days)
Sign the certificate? [y/n]:
Sign the certificate? [y/n]:

1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new entries


1 out of 1 certificate requests certified, commit? [y/n]Write out database with 1 new entries
Data Base Updated
Data Base Updated
+ chmod 644 /etc/contrail/webui_ssl/cs-cert.pem.tmp
+ chmod 644 /etc/contrail/webui_ssl/cs-cert.pem.tmp
++ dirname /etc/contrail/webui_ssl/cs-key.pem
++ dirname /etc/contrail/webui_ssl/cs-key.pem
+ chgrp -R contrail /etc/contrail/webui_ssl
+ chgrp -R contrail /etc/contrail/webui_ssl
++ dirname /etc/contrail/webui_ssl/cs-cert.pem
++ dirname /etc/contrail/webui_ssl/cs-cert.pem
+ chgrp -R contrail /etc/contrail/webui_ssl
+ chgrp -R contrail /etc/contrail/webui_ssl
+ mv /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-key.pem
+ mv /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-key.pem
+ mv /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem
+ rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp
+ mv /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem
+ rm -f /etc/contrail/webui_ssl/cs-cert.pem.lock /etc/contrail/webui_ssl/cs-key.pem.tmp /etc/contrail/webui_ssl/cs-cert.pem.tmp /etc/contrail/webui_ssl/ca-cert.pem.tmp
+ orchestration_manager=openstack
+ [[ openstack == \k\u\b\e\r\n\e\t\e\s ]]
+ [[ -n /v3 ]]
+ identityManager_apiVersion='['\''v3'\'']'
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ cnfg_authProtocol=https
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ analytics_authProtocol=https
+ introspect_strict_ssl=false
+ [[ true == \f\a\l\s\e ]]
+ identityManager_strict_ssl=false
+ [[ true == \f\a\l\s\e ]]
+ '[' -n '' ']'
+ '[' -n '' ']'
+ set_to_lower orchestrationModuleEndPointFromConfig false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval orchestrationModuleEndPointFromConfig=false
++ orchestrationModuleEndPointFromConfig=false
+ set_to_lower contrailEndPointFromConfig true
++ echo true
++ tr '[:upper:]' '[:lower:]'
+ local val=true
+ eval contrailEndPointFromConfig=true
++ contrailEndPointFromConfig=true
+ set_to_lower regionsFromConfig false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval regionsFromConfig=false
++ regionsFromConfig=false
+ set_to_lower networkManager_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval networkManager_strictSSL=false
++ networkManager_strictSSL=false
+ set_to_lower imageManager_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval imageManager_strictSSL=false
++ imageManager_strictSSL=false
+ set_to_lower computeManager_strictSSL false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval computeManager_strictSSL=false
++ computeManager_strictSSL=false
+ set_to_lower storageManager_strictSSL false
++ tr '[:upper:]' '[:lower:]'
++ echo false
+ local val=false
+ eval storageManager_strictSSL=false
++ storageManager_strictSSL=false
+ set_to_lower cnfg_strictSSL True
++ echo True
++ tr '[:upper:]' '[:lower:]'
+ local val=true
+ eval cnfg_strictSSL=true
++ cnfg_strictSSL=true
+ set_to_lower analytics_strictSSL True
++ echo True
++ tr '[:upper:]' '[:lower:]'
+ local val=true
+ eval analytics_strictSSL=true
++ analytics_strictSSL=true
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ set_to_lower analytics_strictSSL false
++ tr '[:upper:]' '[:lower:]'
++ echo true
+ local val=true
+ eval analytics_strictSSL=true
++ analytics_strictSSL=true
+ set_to_lower cassandra_enable_edit false
++ echo false
++ tr '[:upper:]' '[:lower:]'
+ local val=false
+ eval cassandra_enable_edit=false
++ cassandra_enable_edit=false
+ set_to_lower WEBUI_INSECURE_ACCESS false
++ tr '[:upper:]' '[:lower:]'
++ echo false
+ local val=false
+ eval WEBUI_INSECURE_ACCESS=false
++ WEBUI_INSECURE_ACCESS=false
+ set_to_lower serviceEndPointTakePublicURL true
++ echo true
++ tr '[:upper:]' '[:lower:]'
+ local val=true
+ eval serviceEndPointTakePublicURL=true
++ serviceEndPointTakePublicURL=true
+ mkdir -p /etc/contrail
+ cat
++ get_server_json_list CONFIG
++ server_typ=CONFIG_NODES
+++ echo 10.0.0.242
+++ sed 's/^,*//'
+++ sed 's/,*$//'
+++ sed 's/,/'\'','\''/g'
++ srv_list=10.0.0.242
++ echo '['\''10.0.0.242'\'']'
++ get_server_json_list ANALYTICS
++ server_typ=ANALYTICS_NODES
+++ echo 10.0.0.242
+++ sed 's/,*$//'
+++ sed 's/^,*//'
+++ sed 's/,/'\'','\''/g'
++ srv_list=10.0.0.242
++ echo '['\''10.0.0.242'\'']'
++ get_server_json_list CONTROL
++ server_typ=CONTROL_NODES
+++ echo 10.0.0.242
+++ sed 's/^,*//'
+++ sed 's/,*$//'
+++ sed 's/,/'\'','\''/g'
++ srv_list=10.0.0.242
++ echo '['\''10.0.0.242'\'']'
++ get_server_json_list CONFIGDB
++ server_typ=CONFIGDB_NODES
+++ echo 10.0.0.242
+++ sed 's/,*$//'
+++ sed 's/^,*//'
+++ sed 's/,/'\'','\''/g'
++ srv_list=10.0.0.242
++ echo '['\''10.0.0.242'\'']'
+ [[ keystone == \n\o\a\u\t\h ]]
+ echo 'INFO: config /etc/contrail/config.global.js'
INFO: config /etc/contrail/config.global.js
+ cat /etc/contrail/config.global.js
/*
 * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved.
 */

var config = {};

config.orchestration = {};
config.orchestration.Manager = "openstack";

config.orchestrationModuleEndPointFromConfig = false;
config.contrailEndPointFromConfig = true;

config.regionsFromConfig = false;

config.endpoints = {};
config.endpoints.apiServiceType = "ApiServer";
config.endpoints.opServiceType = "OpServer";

config.regions = {};
config.regions.RegionOne = "http://127.0.0.1:5000/v2.0";

config.serviceEndPointTakePublicURL = true;

config.networkManager = {};
config.networkManager.ip = "127.0.0.1";
config.networkManager.port = "9696";
config.networkManager.authProtocol = "http";
config.networkManager.apiVersion = [];
config.networkManager.strictSSL = false;
config.networkManager.ca = "";

config.imageManager = {};
config.imageManager.ip = "127.0.0.1";
config.imageManager.port = "9292";
config.imageManager.authProtocol = "http";
config.imageManager.apiVersion = ['v1', 'v2'];
config.imageManager.strictSSL = false;
config.imageManager.ca = "";

config.computeManager = {};
config.computeManager.ip = "127.0.0.1";
config.computeManager.port = "8774";
config.computeManager.authProtocol = "http";
config.computeManager.apiVersion = ['v1.1', 'v2'];
config.computeManager.strictSSL = false;
config.computeManager.ca = "";

config.identityManager = {};
config.identityManager.ip = "252.242.147.243";
config.identityManager.port = "5050";
config.identityManager.authProtocol = "http";
config.identityManager.apiVersion = ['v3'];
config.identityManager.strictSSL = false;
config.identityManager.ca = "";

config.storageManager = {};
config.storageManager.ip = "127.0.0.1";
config.storageManager.port = "8776";
config.storageManager.authProtocol = "http";
config.storageManager.apiVersion = ['v1'];
config.storageManager.strictSSL = false;
config.storageManager.ca = "";

config.cnfg = {};
config.cnfg.server_ip = ['10.0.0.242'];
config.cnfg.server_port = "8082";
config.cnfg.authProtocol = "https";
config.cnfg.strictSSL = true;
config.cnfg.ca = "/etc/contrail/ssl/certs/ca-cert.pem";
config.cnfg.statusURL = '/global-system-configs';

config.analytics = {};
config.analytics.server_ip = ['10.0.0.242'];
config.analytics.server_port = "8081";
config.analytics.authProtocol = "https";
config.analytics.strictSSL = true;
config.analytics.ca = "/etc/contrail/ssl/certs/ca-cert.pem";
config.analytics.statusURL = '/analytics/uves/bgp-peers';

config.dns = {};
config.dns.server_ip = ['10.0.0.242'];
config.dns.server_port = '8092';
config.dns.statusURL = '/Snh_PageReq?x=AllEntries%20VdnsServersReq';

config.introspect = {};
config.introspect.ssl = {};
config.introspect.ssl.enabled = true;
config.introspect.ssl.key = '/etc/contrail/ssl/private/server-privkey.pem';
config.introspect.ssl.cert = '/etc/contrail/ssl/certs/server.pem';
config.introspect.ssl.ca = '/etc/contrail/ssl/certs/ca-cert.pem';
config.introspect.ssl.strictSSL = false;

config.jobServer = {};
config.jobServer.server_ip = '127.0.0.1';
config.jobServer.server_port = '3000';

config.files = {};
config.files.download_path = '/tmp';

config.cassandra = {};
config.cassandra.server_ips = ['10.0.0.242'];
config.cassandra.server_port = '9041';
config.cassandra.enable_edit = false;
config.cassandra.use_ssl = true;
config.cassandra.ca_certs = '/etc/contrail/ssl/certs/ca-cert.pem';

config.kue = {};
config.kue.ui_port = '3002'

config.webui_addresses = ['10.0.0.242'];

config.insecure_access = false;

config.http_port = '8180';

config.https_port = '8143';

config.require_auth = false;

config.node_worker_count = 1;

config.maxActiveJobs = 10;

config.redisDBIndex = 3;

config.CONTRAIL_SERVICE_RETRY_TIME = 300000; //5 minutes

config.redis_server_port = '6379';
config.redis_server_ip = '127.0.0.1';
config.redis_dump_file = '/var/lib/redis/dump-webui.rdb';
config.redis_password = '';

config.logo_file = '/opt/contrail/images/logo.png';
config.favicon_file = '/opt/contrail/images/favicon.ico';

config.featurePkg = {};
config.featurePkg.webController = {};
config.featurePkg.webController.path = '/usr/src/contrail/contrail-web-controller';
config.featurePkg.webController.enable = true;

config.qe = {};
config.qe.enable_stat_queries = false;

config.logs = {};
config.logs.level = 'debug';

config.getDomainProjectsFromApiServer = false;
config.network = {};
config.network.L2_enable = false;

config.getDomainsFromApiServer = false;
config.jsonSchemaPath = "/usr/src/contrail/contrail-web-core/src/serverroot/configJsonSchemas";

config.server_options = {};
config.server_options.key_file = '/etc/contrail/webui_ssl/cs-key.pem';
config.server_options.cert_file = '/etc/contrail/webui_ssl/cs-cert.pem';
config.server_options.ciphers = 'ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA';

module.exports = config;
+ cat
+ echo 'INFO: config /etc/contrail/contrail-webui-userauth.js'
INFO: config /etc/contrail/contrail-webui-userauth.js
+ cat /etc/contrail/contrail-webui-userauth.js
/*
 * Copyright (c) 2014 Juniper Networks, Inc. All rights reserved.
 */

var auth = {};
auth.admin_user = 'admin';
auth.admin_password = 'password';
auth.admin_token = '';
auth.admin_tenant_name = 'admin';
auth.project_domain_name = 'admin_domain';
auth.user_domain_name = 'admin_domain';

module.exports = auth;
+ set_vnc_api_lib_ini
+ local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp
+ cat
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ cat
+ [[ keystone == \k\e\y\s\t\o\n\e ]]
+ cat
+ [[ http == \h\t\t\p\s ]]
+ mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini
+ run_service /usr/bin/node webServerStart.js
+ [[ -n 1999 ]]
+ [[ -n 1999 ]]
+ local owner_opts=1999:1999
+ mkdir -p /etc/contrail /var/lib/contrail
+ chown 1999:1999 /etc/contrail /var/lib/contrail
+ find /etc/contrail -uid 0 -exec chown 1999:1999 '{}' +
+ chmod 755 /etc/contrail
+ do_run_service /usr/bin/node webServerStart.js
+ [[ -n 1999 ]]
+ [[ -n 1999 ]]
+ mkdir -p /var/crashes
+ chmod 777 /var/crashes
++ id -un 1999
+ local user_name=contrail
+ export HOME=/home/contrail
+ HOME=/home/contrail
+ mkdir -p /home/contrail
+ chown -R 1999:1999 /home/contrail
+ exec setpriv --reuid 1999 --regid 1999 --clear-groups --no-new-privs /usr/bin/node webServerStart.js
04/17/2025 02:08:08 AM - debug: Built Package List as:[{"pkgName":null,"parseURL.xml":["/src/serverroot/common/url.routes.js","/src/serverroot/utils/url.routes.js","/src/serverroot/web/routes/url.routes.js","/webroot/reports/qe/api/url.routes.js","/webroot/reports/udd/api/url.routes.js"],"jobProcess.xml":["/src/serverroot/jobs/core/jobsCb.api.js"],"featureList.xml":["/src/serverroot/web/core/feature.list.js"]},{"pkgName":"webController","parseURL.xml":["/webroot/common/api/url.routes.js","/webroot/config/common/api/url.routes.js","/webroot/config/dns/records/api/url.routes.js","/webroot/config/dns/servers/api/url.routes.js","/webroot/config/firewall/common/fwpolicy/api/url.routes.js","/webroot/config/infra/bgp/api/url.routes.js","/webroot/config/infra/linklocalservices/api/url.routes.js","/webroot/config/infra/quotas/api/url.routes.js","/webroot/config/infra/serviceappliance/api/url.routes.js","/webroot/config/infra/serviceapplianceset/api/url.routes.js","/webroot/config/infra/vrouters/api/url.routes.js","/webroot/config/networking/fip/api/url.routes.js","/webroot/config/networking/ipam/api/url.routes.js","/webroot/config/networking/loadbalancer/api/url.routes.js","/webroot/config/networking/logicalrouter/api/url.routes.js","/webroot/config/networking/networks/api/url.routes.js","/webroot/config/networking/policy/api/url.routes.js","/webroot/config/networking/port/api/url.routes.js","/webroot/config/networking/routetable/api/url.routes.js","/webroot/config/networking/routingpolicy/api/url.routes.js","/webroot/config/networking/securitygroup/api/url.routes.js","/webroot/config/physicaldevices/interfaces/api/url.routes.js","/webroot/config/physicaldevices/physicalrouters/api/url.routes.js","/webroot/config/port/api/url.routes.js","/webroot/config/services/bgpasaservice/api/url.routes.js","/webroot/config/services/instances/api/url.routes.js","/webroot/config/services/templates/api/url.routes.js","/webroot/monitor/infrastructure/analyticsnode/api/url.routes.js","/webroot/monitor/infrastructure/confignode/api/url.routes.js","/webroot/monitor/infrastructure/controlnode/api/url.routes.js","/webroot/monitor/infrastructure/databasenode/api/url.routes.js","/webroot/monitor/infrastructure/globalcontroller/api/url.routes.js","/webroot/monitor/infrastructure/underlay/api/url.routes.js","/webroot/monitor/infrastructure/vrouter/api/url.routes.js","/webroot/monitor/networking/api/url.routes.js","/webroot/setting/configdb/ui/api/url.routes.js"],"jobProcess.xml":["/webroot/monitor/infrastructure/controlnode/jobs/jobsCb.api.js","/webroot/monitor/infrastructure/vrouter/jobs/jobsCb.api.js","/webroot/monitor/networking/jobs/jobsCb.api.js"],"featureList.xml":["/webroot/common/api/feature.list.js"]}]
04/17/2025 02:08:08 AM - debug: Redis: connect
04/17/2025 02:08:08 AM - debug: Redis: connect
04/17/2025 02:08:08 AM - debug: Redis: connect
04/17/2025 02:08:08 AM - debug: Redis: connect
04/17/2025 02:08:08 AM - debug: Redis: connect
04/17/2025 02:08:08 AM - debug: Redis: ready
04/17/2025 02:08:08 AM - debug: Redis: ready
04/17/2025 02:08:08 AM - debug: Redis: ready
04/17/2025 02:08:08 AM - debug: Redis: ready
04/17/2025 02:08:08 AM - debug: Redis: ready
Done, creating file: /usr/src/contrail/contrail-web-core/webroot/common/api/regions.js
04/17/2025 02:08:08 AM - debug: Web Server bound to port 3000 to Job Server
04/17/2025 02:08:08 AM - debug: Redis: ready
04/17/2025 02:08:08 AM - debug: Redis DB 2 SELECT suuccess:
04/17/2025 02:08:09 AM - debug: Built Package List as:[{"pkgName":null,"parseURL.xml":["/src/serverroot/common/url.routes.js","/src/serverroot/utils/url.routes.js","/src/serverroot/web/routes/url.routes.js","/webroot/reports/qe/api/url.routes.js","/webroot/reports/udd/api/url.routes.js"],"jobProcess.xml":["/src/serverroot/jobs/core/jobsCb.api.js"],"featureList.xml":["/src/serverroot/web/core/feature.list.js"]},{"pkgName":"webController","parseURL.xml":["/webroot/common/api/url.routes.js","/webroot/config/common/api/url.routes.js","/webroot/config/dns/records/api/url.routes.js","/webroot/config/dns/servers/api/url.routes.js","/webroot/config/firewall/common/fwpolicy/api/url.routes.js","/webroot/config/infra/bgp/api/url.routes.js","/webroot/config/infra/linklocalservices/api/url.routes.js","/webroot/config/infra/quotas/api/url.routes.js","/webroot/config/infra/serviceappliance/api/url.routes.js","/webroot/config/infra/serviceapplianceset/api/url.routes.js","/webroot/config/infra/vrouters/api/url.routes.js","/webroot/config/networking/fip/api/url.routes.js","/webroot/config/networking/ipam/api/url.routes.js","/webroot/config/networking/loadbalancer/api/url.routes.js","/webroot/config/networking/logicalrouter/api/url.routes.js","/webroot/config/networking/networks/api/url.routes.js","/webroot/config/networking/policy/api/url.routes.js","/webroot/config/networking/port/api/url.routes.js","/webroot/config/networking/routetable/api/url.routes.js","/webroot/config/networking/routingpolicy/api/url.routes.js","/webroot/config/networking/securitygroup/api/url.routes.js","/webroot/config/physicaldevices/interfaces/api/url.routes.js","/webroot/config/physicaldevices/physicalrouters/api/url.routes.js","/webroot/config/port/api/url.routes.js","/webroot/config/services/bgpasaservice/api/url.routes.js","/webroot/config/services/instances/api/url.routes.js","/webroot/config/services/templates/api/url.routes.js","/webroot/monitor/infrastructure/analyticsnode/api/url.routes.js","/webroot/monitor/infrastructure/confignode/api/url.routes.js","/webroot/monitor/infrastructure/controlnode/api/url.routes.js","/webroot/monitor/infrastructure/databasenode/api/url.routes.js","/webroot/monitor/infrastructure/globalcontroller/api/url.routes.js","/webroot/monitor/infrastructure/underlay/api/url.routes.js","/webroot/monitor/infrastructure/vrouter/api/url.routes.js","/webroot/monitor/networking/api/url.routes.js","/webroot/setting/configdb/ui/api/url.routes.js"],"jobProcess.xml":["/webroot/monitor/infrastructure/controlnode/jobs/jobsCb.api.js","/webroot/monitor/infrastructure/vrouter/jobs/jobsCb.api.js","/webroot/monitor/networking/jobs/jobsCb.api.js"],"featureList.xml":["/webroot/common/api/feature.list.js"]}]
04/17/2025 02:08:09 AM - debug: Redis: connect
04/17/2025 02:08:09 AM - debug: Redis: connect
04/17/2025 02:08:09 AM - debug: Redis: connect
04/17/2025 02:08:09 AM - debug: Redis: connect
04/17/2025 02:08:09 AM - debug: Redis: connect
04/17/2025 02:08:09 AM - debug: Redis: ready
04/17/2025 02:08:09 AM - debug: Redis: ready
04/17/2025 02:08:09 AM - debug: Redis: ready
04/17/2025 02:08:09 AM - debug: Redis: ready
04/17/2025 02:08:09 AM - debug: Redis: ready
04/17/2025 02:08:09 AM - debug: Redis: ready
04/17/2025 02:08:09 AM - debug: Redis DB 3 SELECT suuccess:
04/17/2025 02:08:09 AM - debug: Redis: ready
04/17/2025 02:08:09 AM - debug: Redis DB 2 SELECT suuccess:
04/17/2025 02:08:09 AM - debug: Registering Static Directory: /usr/src/contrail/contrail-web-core/webroot
04/17/2025 02:08:09 AM - debug: Registering Static Directory: /usr/src/contrail/contrail-web-controller/webroot
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-core/src/serverroot/common/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-core/src/serverroot/utils/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-core/src/serverroot/web/routes/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-core/webroot/reports/qe/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-core/webroot/reports/udd/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/common/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/common/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/dns/records/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/dns/servers/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/firewall/common/fwpolicy/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/infra/bgp/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/infra/linklocalservices/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/infra/quotas/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/infra/serviceappliance/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/infra/serviceapplianceset/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/infra/vrouters/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/fip/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/ipam/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/loadbalancer/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/logicalrouter/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/networks/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/policy/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/port/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/routetable/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/routingpolicy/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/networking/securitygroup/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/physicaldevices/interfaces/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/physicaldevices/physicalrouters/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/port/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/services/bgpasaservice/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/services/instances/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/config/services/templates/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/analyticsnode/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/confignode/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/controlnode/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/databasenode/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/globalcontroller/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/underlay/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/monitor/infrastructure/vrouter/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/monitor/networking/api/url.routes.js
04/17/2025 02:08:09 AM - debug: Registered URLs to APP :/usr/src/contrail/contrail-web-controller/webroot/setting/configdb/ui/api/url.routes.js
04/17/2025 02:08:10 AM - debug: Registering feature Lists: /usr/src/contrail/contrail-web-core/src/serverroot/web/core/feature.list.js
04/17/2025 02:08:10 AM - debug: Registering feature Lists: /usr/src/contrail/contrail-web-controller/webroot/common/api/feature.list.js
04/17/2025 02:08:10 AM - debug: **** Contrail-WebUI Server ****
04/17/2025 02:08:10 AM - debug: Redis: connect
04/17/2025 02:08:10 AM - debug: Redis: connect
04/17/2025 02:08:10 AM - debug: Redis: connect
{ [Error: All host(s) tried for query failed. First host tried, 10.0.0.242:9042: Error: connect ECONNREFUSED. See innerErrors.]
  innerErrors: 
   { '10.0.0.242:9042': 
      { [Error: connect ECONNREFUSED]
        code: 'ECONNREFUSED',
        errno: 'ECONNREFUSED',
        syscall: 'connect' } },
  info: 'Represents an error when a query cannot be performed because no host is available or could be reached by the driver.',
  message: 'All host(s) tried for query failed. First host tried, 10.0.0.242:9042: Error: connect ECONNREFUSED. See innerErrors.' }
04/17/2025 02:08:10 AM - error: Configured/Default MOTD file read error code 34
04/17/2025 02:08:10 AM - debug: Redis: ready
04/17/2025 02:08:10 AM - debug: Redis: ready
04/17/2025 02:08:10 AM - debug: Redis: ready
04/17/2025 02:08:11 AM - debug: Got the token successfully for tenant:admin
04/17/2025 02:08:11 AM - error: Error: connect ECONNREFUSED
    at errnoException (net.js:905:11)
    at Object.afterConnect [as oncomplete] (net.js:896:19)
04/17/2025 02:08:11 AM - error: URL [https://10.0.0.242:8081/analytics/uves/bgp-peers] returned error [{"message":"{ [Error: connect ECONNREFUSED]\n  code: 'ECONNREFUSED',\n  errno: 'ECONNREFUSED',\n  syscall: 'connect' }","custom":true,"responseCode":500,"code":"ECONNREFUSED"}]
04/17/2025 02:08:11 AM - debug: Contrail Service Response Updated by process:247 {"OpServer":[]}
04/17/2025 02:08:11 AM - debug: Got the token successfully for tenant:admin
04/17/2025 02:08:11 AM - error: Error: connect ECONNREFUSED
    at errnoException (net.js:905:11)
    at Object.afterConnect [as oncomplete] (net.js:896:19)
04/17/2025 02:08:11 AM - error: URL [https://10.0.0.242:8082/global-system-configs] returned error [{"message":"{ [Error: connect ECONNREFUSED]\n  code: 'ECONNREFUSED',\n  errno: 'ECONNREFUSED',\n  syscall: 'connect' }","custom":true,"responseCode":500,"code":"ECONNREFUSED"}]
04/17/2025 02:08:11 AM - debug: Contrail Service Response Updated by process:247 {"ApiServer":[]}
04/17/2025 02:08:45 AM - debug: Contrail Service Response Updated by process:247 {"dns-server":[{"@publisher-id":"10.0.0.242","ip-address":"10.0.0.242","port":"8092","status":"up"}]}