+++ date
++ echo 'INFO: =================== Mon Apr 28 01:57:52 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:57:52 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 85192
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ ip address show
++++++ grep -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
++++++ grep -m 1 vhost0
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ grep -m 1 -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep inet
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G        5.2G         40M         17G         22G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
modprobe: FATAL: Module vrouter not found.
+ echo 'WARNING: failed to load vrouter driver'
WARNING: failed to load vrouter driver
+ return 1
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ return 0
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
vhost_create: Unknown error -95
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
Error registering NetLink client: No such file or directory (2)
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
Error registering NetLink client: No such file or directory (2)
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
Cannot find device "vhost0"
+ ip link set dev vhost0 up
Cannot find device "vhost0"
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
cat: /sys/module/vrouter/version: No such file or directory
+ local loaded_vrouter_ver=
++ modinfo -F version vrouter
modinfo: ERROR: Module vrouter not found.
+ local available_vrouter_ver=
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter='
INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=
+ return 1
+ res=1
+ [[ 1 != 0 ]]
+ echo 'FATAL: failed to init vhost0'
FATAL: failed to init vhost0
+ exit 1
+++ date
++ echo 'INFO: =================== Mon Apr 28 01:57:56 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:57:56 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 85819
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ ip address show
++++++ grep -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
++++++ grep -m 1 vhost0
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ grep -m 1 -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
++ grep inet
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
modprobe: FATAL: Module vrouter not found.
+ echo 'WARNING: failed to load vrouter driver'
WARNING: failed to load vrouter driver
+ return 1
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ return 0
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
vhost_create: Unknown error -95
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
Error registering NetLink client: No such file or directory (2)
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
Error registering NetLink client: No such file or directory (2)
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
Cannot find device "vhost0"
+ ip link set dev vhost0 up
Cannot find device "vhost0"
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
cat: /sys/module/vrouter/version: No such file or directory
+ local loaded_vrouter_ver=
++ modinfo -F version vrouter
modinfo: ERROR: Module vrouter not found.
+ local available_vrouter_ver=
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter='
INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=
+ return 1
+ res=1
+ [[ 1 != 0 ]]
+ echo 'FATAL: failed to init vhost0'
FATAL: failed to init vhost0
+ exit 1
+++ date
++ echo 'INFO: =================== Mon Apr 28 01:57:57 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:57:57 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 86035
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ ip address show
++++++ grep -F 'inet 10.20.0.192/'
++++++ grep -m 1 vhost0
++++++ awk '{print($NF)}'
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ grep -m 1 -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep inet
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
modprobe: FATAL: Module vrouter not found.
+ echo 'WARNING: failed to load vrouter driver'
WARNING: failed to load vrouter driver
+ return 1
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ return 0
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
vhost_create: Unknown error -95
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
Error registering NetLink client: No such file or directory (2)
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
Error registering NetLink client: No such file or directory (2)
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
Cannot find device "vhost0"
+ ip link set dev vhost0 up
Cannot find device "vhost0"
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
cat: /sys/module/vrouter/version: No such file or directory
+ local loaded_vrouter_ver=
++ modinfo -F version vrouter
modinfo: ERROR: Module vrouter not found.
+ local available_vrouter_ver=
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter='
INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=
+ return 1
+ res=1
+ [[ 1 != 0 ]]
+ echo 'FATAL: failed to init vhost0'
FATAL: failed to init vhost0
+ exit 1
+++ date
++ echo 'INFO: =================== Mon Apr 28 01:57:58 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:57:58 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 86275
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ ip address show
++++++ grep -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
++++++ grep -m 1 vhost0
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ grep -m 1 -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep inet
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
modprobe: FATAL: Module vrouter not found.
+ echo 'WARNING: failed to load vrouter driver'
WARNING: failed to load vrouter driver
+ return 1
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ return 0
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
vhost_create: Unknown error -95
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
Error registering NetLink client: No such file or directory (2)
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
Error registering NetLink client: No such file or directory (2)
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
Cannot find device "vhost0"
+ ip link set dev vhost0 up
Cannot find device "vhost0"
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
cat: /sys/module/vrouter/version: No such file or directory
+ local loaded_vrouter_ver=
++ modinfo -F version vrouter
modinfo: ERROR: Module vrouter not found.
+ local available_vrouter_ver=
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter='
INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=
+ return 1
+ res=1
+ [[ 1 != 0 ]]
+ echo 'FATAL: failed to init vhost0'
FATAL: failed to init vhost0
+ exit 1
+++ date
++ echo 'INFO: =================== Mon Apr 28 01:57:59 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:57:59 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 86485
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ ip address show
++++++ grep -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
++++++ grep -m 1 vhost0
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ grep -m 1 -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep inet
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.7G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
modprobe: FATAL: Module vrouter not found.
+ echo 'WARNING: failed to load vrouter driver'
WARNING: failed to load vrouter driver
+ return 1
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ return 0
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
vhost_create: Unknown error -95
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
Error registering NetLink client: No such file or directory (2)
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
Error registering NetLink client: No such file or directory (2)
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
Cannot find device "vhost0"
+ ip link set dev vhost0 up
Cannot find device "vhost0"
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
cat: /sys/module/vrouter/version: No such file or directory
+ local loaded_vrouter_ver=
++ modinfo -F version vrouter
modinfo: ERROR: Module vrouter not found.
+ local available_vrouter_ver=
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter='
INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=
+ return 1
+ res=1
+ [[ 1 != 0 ]]
+ echo 'FATAL: failed to init vhost0'
FATAL: failed to init vhost0
+ exit 1
+++ date
++ echo 'INFO: =================== Mon Apr 28 01:58:01 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:58:01 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 86704
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ awk '{print($NF)}'
++++++ grep -F 'inet 10.20.0.192/'
++++++ grep -m 1 vhost0
++++++ ip address show
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ awk '{print($NF)}'
++++++ grep -m 1 -F 'inet 10.20.0.192/'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep inet
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.7G         19G         40M        3.1G         21G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.7G         19G         40M        3.1G         21G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
modprobe: FATAL: Module vrouter not found.
+ echo 'WARNING: failed to load vrouter driver'
WARNING: failed to load vrouter driver
+ return 1
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ return 0
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
vhost_create: Unknown error -95
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
Error registering NetLink client: No such file or directory (2)
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
Error registering NetLink client: No such file or directory (2)
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
Cannot find device "vhost0"
+ ip link set dev vhost0 up
Cannot find device "vhost0"
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
cat: /sys/module/vrouter/version: No such file or directory
+ local loaded_vrouter_ver=
++ modinfo -F version vrouter
modinfo: ERROR: Module vrouter not found.
+ local available_vrouter_ver=
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter='
INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=
+ return 1
+ res=1
+ [[ 1 != 0 ]]
+ echo 'FATAL: failed to init vhost0'
FATAL: failed to init vhost0
+ exit 1
+++ date
++ echo 'INFO: =================== Mon Apr 28 01:58:05 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:58:05 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ cut -d / -f 1
+++ command -v ip
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 87159
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ ip address show
++++++ grep -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
++++++ grep -m 1 vhost0
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ grep -m 1 -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep inet
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
modprobe: FATAL: Module vrouter not found.
+ echo 'WARNING: failed to load vrouter driver'
WARNING: failed to load vrouter driver
+ return 1
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ return 0
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
vhost_create: Unknown error -95
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
Error registering NetLink client: No such file or directory (2)
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
Error registering NetLink client: No such file or directory (2)
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
Cannot find device "vhost0"
+ ip link set dev vhost0 up
Cannot find device "vhost0"
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
cat: /sys/module/vrouter/version: No such file or directory
+ local loaded_vrouter_ver=
++ modinfo -F version vrouter
modinfo: ERROR: Module vrouter not found.
+ local available_vrouter_ver=
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter='
INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=
+ return 1
+ res=1
+ [[ 1 != 0 ]]
+ echo 'FATAL: failed to init vhost0'
FATAL: failed to init vhost0
+ exit 1
+++ date
++ echo 'INFO: =================== Mon Apr 28 01:58:11 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:58:11 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ local nic=ens3
+++ cut -d / -f 1
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 87649
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ ip address show
++++++ grep -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
++++++ grep -m 1 vhost0
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ grep -m 1 -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep inet
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.5G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.5G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
modprobe: FATAL: Module vrouter not found.
+ echo 'WARNING: failed to load vrouter driver'
WARNING: failed to load vrouter driver
+ return 1
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ return 0
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
vhost_create: Unknown error -95
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
Error registering NetLink client: No such file or directory (2)
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
Error registering NetLink client: No such file or directory (2)
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
Cannot find device "vhost0"
+ ip link set dev vhost0 up
Cannot find device "vhost0"
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
cat: /sys/module/vrouter/version: No such file or directory
+ local loaded_vrouter_ver=
++ modinfo -F version vrouter
modinfo: ERROR: Module vrouter not found.
+ local available_vrouter_ver=
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter='
INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=
+ return 1
+ res=1
+ [[ 1 != 0 ]]
+ echo 'FATAL: failed to init vhost0'
FATAL: failed to init vhost0
+ exit 1
+++ date
++ echo 'INFO: =================== Mon Apr 28 01:58:25 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:58:25 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 88643
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ ip address show
++++++ grep -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
++++++ grep -m 1 vhost0
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ grep -m 1 -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep inet
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.2G         22G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.6G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
modprobe: FATAL: Module vrouter not found.
+ echo 'WARNING: failed to load vrouter driver'
WARNING: failed to load vrouter driver
+ return 1
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ return 0
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ return 0
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
vhost_create: Unknown error -95
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
Error registering NetLink client: No such file or directory (2)
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
Error registering NetLink client: No such file or directory (2)
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
Cannot find device "vhost0"
+ ip link set dev vhost0 up
Cannot find device "vhost0"
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
cat: /sys/module/vrouter/version: No such file or directory
+ local loaded_vrouter_ver=
++ modinfo -F version vrouter
modinfo: ERROR: Module vrouter not found.
+ local available_vrouter_ver=
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter='
INFO: versions: agent=nightly, loaded_vrouter=, available_vrouter=
+ return 1
+ res=1
+ [[ 1 != 0 ]]
+ echo 'FATAL: failed to init vhost0'
FATAL: failed to init vhost0
+ exit 1
+++ date
++ echo 'INFO: =================== Mon Apr 28 01:58:51 UTC 2025 ==================='
INFO: =================== Mon Apr 28 01:58:51 UTC 2025 ===================
++ LOG_LOCAL=1
++ source /functions.sh
++ source /contrail-functions.sh
+++ get_default_ip
++++ get_default_nic
++++ get_gateway_nic_for_ip 1
++++ command -v ip
++++ local ip=1
+++++ ip route get 1
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=ens3
++++ [[ ens3 == \l\o ]]
++++ echo ens3
+++ local nic=ens3
+++ get_ip_for_nic ens3
+++ local nic=ens3
+++ get_cidr_for_nic ens3
+++ command -v ip
+++ cut -d / -f 1
+++ local nic=ens3
+++ ip addr show dev ens3
+++ grep 'inet '
+++ awk '{print $2}'
+++ head -n 1
++ DEFAULT_LOCAL_IP=10.0.0.38
++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN
++ VXLAN_VN_ID_MODE=automatic
++ DPDK_UIO_DRIVER=uio_pci_generic
++ CPU_CORE_MASK=0x01
++ SERVICE_CORE_MASK=
++ DPDK_CTRL_THREAD_MASK=
++ HUGE_PAGES=
++ HUGE_PAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HUGE_PAGES_1GB_DIR=
++ HUGE_PAGES_2MB_DIR=
++ [[ 0 != 0 ]]
++ [[ 0 != 256 ]]
++ [[ -z '' ]]
+++ mount -t hugetlbfs
+++ awk '/pagesize=2M/{print($3)}'
+++ tail -n 1
++ HUGE_PAGES_2MB_DIR=/dev/hugepages
++ DPDK_MEM_PER_SOCKET=1024
++ DPDK_COMMAND_ADDITIONAL_ARGS=
++ NIC_OFFLOAD_ENABLE=False
++ DPDK_ENABLE_VLAN_FWRD=False
++ DIST_SNAT_PROTO_PORT_LIST=
++ CLOUD_ORCHESTRATOR=openstack
++ CLOUD_ADMIN_ROLE=admin
++ AAA_MODE=rbac
++ AUTH_MODE=keystone
++ AUTH_PARAMS=
++ SSL_ENABLE=false
++ SSL_INSECURE=True
++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem
++ SELFSIGNED_CERTS_WITH_IPS=True
++ CONTROLLER_NODES=10.0.0.38
++ ANALYTICS_ALARM_ENABLE=True
++ ANALYTICS_SNMP_ENABLE=True
++ ANALYTICSDB_ENABLE=True
++ ANALYTICS_NODES=10.0.0.38
++ ANALYTICSDB_NODES=10.0.0.38
++ ANALYTICS_SNMP_NODES=10.0.0.38
++ ANALYTICS_API_PORT=8081
++ ANALYTICS_API_INTROSPECT_PORT=8090
++ ANALYTICSDB_PORT=9160
++ ANALYTICSDB_CQL_PORT=9042
++ TOPOLOGY_INTROSPECT_PORT=5921
++ QUERYENGINE_INTROSPECT_PORT=8091
+++ get_server_list ANALYTICS ':8081 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8081 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8081 '
+++ '[' -n '10.0.0.38:8081 ' ']'
+++ echo 10.0.0.38:8081
++ ANALYTICS_SERVERS=10.0.0.38:8081
+++ get_server_list ANALYTICSDB ':9042 '
+++ local server_typ=ANALYTICSDB_NODES
+++ local 'port_with_delim=:9042 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9042 '
+++ '[' -n '10.0.0.38:9042 ' ']'
+++ echo 10.0.0.38:9042
++ ANALYTICSDB_CQL_SERVERS=10.0.0.38:9042
++ ANALYTICS_API_VIP=
++ ANALYTICS_ALARM_NODES=10.0.0.38
++ ALARMGEN_INTROSPECT_PORT=5995
++ BGP_PORT=179
++ BGP_AUTO_MESH=true
++ BGP_ASN=64512
++ ENABLE_4BYTE_AS=false
++ APPLY_DEFAULTS=true
++ COLLECTOR_PORT=8086
++ COLLECTOR_INTROSPECT_PORT=8089
++ COLLECTOR_SYSLOG_PORT=514
++ COLLECTOR_SFLOW_PORT=6343
++ COLLECTOR_IPFIX_PORT=4739
++ COLLECTOR_PROTOBUF_PORT=3333
++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514
++ SNMPCOLLECTOR_INTROSPECT_PORT=5920
+++ get_server_list ANALYTICS ':8086 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:8086 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8086 '
+++ '[' -n '10.0.0.38:8086 ' ']'
+++ echo 10.0.0.38:8086
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ CASSANDRA_PORT=9160
++ CASSANDRA_CQL_PORT=9042
++ CASSANDRA_SSL_STORAGE_PORT=7011
++ CASSANDRA_STORAGE_PORT=7010
++ CASSANDRA_JMX_LOCAL_PORT=7200
++ CONFIGDB_CASSANDRA_DRIVER=cql
++ CONFIG_NODES=10.0.0.38
++ CONFIGDB_NODES=10.0.0.38
++ CONFIG_API_PORT=8082
++ CONFIG_API_INTROSPECT_PORT=8084
++ CONFIG_API_ADMIN_PORT=8095
++ CONFIGDB_PORT=9161
++ CONFIGDB_CQL_PORT=9041
+++ get_server_list CONFIG ':8082 '
+++ local server_typ=CONFIG_NODES
+++ local 'port_with_delim=:8082 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:8082 '
+++ '[' -n '10.0.0.38:8082 ' ']'
+++ echo 10.0.0.38:8082
++ CONFIG_SERVERS=10.0.0.38:8082
+++ get_server_list CONFIGDB ':9161 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9161 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9161 '
+++ '[' -n '10.0.0.38:9161 ' ']'
+++ echo 10.0.0.38:9161
++ CONFIGDB_SERVERS=10.0.0.38:9161
+++ get_server_list CONFIGDB ':9041 '
+++ local server_typ=CONFIGDB_NODES
+++ local 'port_with_delim=:9041 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9041 '
+++ '[' -n '10.0.0.38:9041 ' ']'
+++ echo 10.0.0.38:9041
++ CONFIGDB_CQL_SERVERS=10.0.0.38:9041
++ CONFIG_API_VIP=
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_WORKER_COUNT=1
++ CONFIG_API_MAX_REQUESTS=1024
++ ANALYTICS_API_SSL_ENABLE=false
++ ANALYTICS_API_SSL_INSECURE=True
++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_ENABLE=false
++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum
++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum
++ CASSANDRA_SSL_PROTOCOL=TLS
++ CASSANDRA_SSL_ALGORITHM=SunX509
++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]'
++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4
++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4
++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256
++ CASSANDRA_CONFIG_CONCURRECT_READS=64
++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64
++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects
++ CASSANDRA_REAPER_ENABLED=false
++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey
++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser
++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass
++ CASSANDRA_REAPER_APP_PORT=8071
++ CASSANDRA_REAPER_ADM_PORT=8072
++ CONTROL_NODES=10.20.0.192
++ CONTROL_INTROSPECT_PORT=8083
++ DNS_NODES=10.20.0.192
++ DNS_SERVER_PORT=53
++ DNS_INTROSPECT_PORT=8092
++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg==
++ USE_EXTERNAL_TFTP=False
++ ZOOKEEPER_NODES=10.0.0.38
++ ZOOKEEPER_PORT=2181
++ ZOOKEEPER_PORTS=2888:3888
+++ get_server_list ZOOKEEPER :2181,
+++ local server_typ=ZOOKEEPER_NODES
+++ local port_with_delim=:2181,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:2181,
+++ '[' -n 10.0.0.38:2181, ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS=10.0.0.38:2181
+++ get_server_list ZOOKEEPER ':2181 '
+++ local server_typ=ZOOKEEPER_NODES
+++ local 'port_with_delim=:2181 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:2181 '
+++ '[' -n '10.0.0.38:2181 ' ']'
+++ echo 10.0.0.38:2181
++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.38:2181
++ RABBITMQ_NODES=10.0.0.38
++ RABBITMQ_NODE_PORT=5673
+++ get_server_list RABBITMQ :5673,
+++ local server_typ=RABBITMQ_NODES
+++ local port_with_delim=:5673,
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+=10.0.0.38:5673,
+++ '[' -n 10.0.0.38:5673, ']'
+++ echo 10.0.0.38:5673
++ RABBITMQ_SERVERS=10.0.0.38:5673
++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true
++ RABBITMQ_VHOST=/
++ RABBITMQ_USER=guest
++ RABBITMQ_PASSWORD=guest
++ RABBITMQ_USE_SSL=false
++ RABBITMQ_SSL_VER=tlsv1.2
++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ RABBITMQ_HEARTBEAT_INTERVAL=60
++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal
++ RABBITMQ_MIRRORED_QUEUE_MODE=all
++ REDIS_SERVER_PORT=6379
++ REDIS_SERVER_PASSWORD=
+++ get_server_list ANALYTICS ':6379 '
+++ local server_typ=ANALYTICS_NODES
+++ local 'port_with_delim=:6379 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:6379 '
+++ '[' -n '10.0.0.38:6379 ' ']'
+++ echo 10.0.0.38:6379
++ REDIS_SERVERS=10.0.0.38:6379
++ REDIS_LISTEN_ADDRESS=
++ REDIS_PROTECTED_MODE=
++ REDIS_SSL_ENABLE=false
++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ redis_ssl_config=
++ KAFKA_NODES=10.0.0.38
++ KAFKA_PORT=9092
+++ get_server_list KAFKA ':9092 '
+++ local server_typ=KAFKA_NODES
+++ local 'port_with_delim=:9092 '
+++ local server_list=
+++ IFS=,
+++ read -ra server_list
+++ local extended_server_list=
+++ for server in '"${server_list[@]}"'
++++ echo 10.0.0.38
+++ local server_address=10.0.0.38
+++ extended_server_list+='10.0.0.38:9092 '
+++ '[' -n '10.0.0.38:9092 ' ']'
+++ echo 10.0.0.38:9092
++ KAFKA_SERVERS=10.0.0.38:9092
++ KAFKA_SSL_ENABLE=false
++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ KEYSTONE_AUTH_ADMIN_TENANT=admin
++ KEYSTONE_AUTH_ADMIN_USER=admin
++ KEYSTONE_AUTH_ADMIN_PASSWORD=contrail123
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_PUBLIC_PORT=5000
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_ENDPOINT_TYPE=
++ KEYSTONE_AUTH_SYNC_ON_DEMAND=
++ KEYSTONE_AUTH_INTERFACE=public
++ KUBEMANAGER_NODES=10.0.0.38
++ KUBERNETES_CLUSTER_NAME=k8s
++ KUBERNETES_CNI_META_PLUGIN=multus
++ METADATA_PROXY_SECRET=contrail
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ BARBICAN_PASSWORD=contrail123
++ AGENT_MODE=kernel
++ EXTERNAL_ROUTERS=
++ SUBCLUSTER=
++ VROUTER_COMPUTE_NODE_ADDRESS=
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_DECRYPT_INTERFACE=decrypt0
++ VROUTER_DECRYPT_KEY=15
++ VROUTER_MODULE_OPTIONS=
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ TSN_EVPN_MODE=False
++ TSN_NODES='[]'
++ PRIORITY_ID=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_SCHEDULING=
++ QOS_QUEUE_ID=
++ QOS_LOGICAL_QUEUES=
++ QOS_DEF_HW_QUEUE=False
++ PRIORITY_TAGGING=True
++ SLO_DESTINATION=collector
++ '[' -n '' ']'
++ SAMPLE_DESTINATION=collector
++ FLOW_EXPORT_RATE=0
++ WEBUI_NODES=10.0.0.38
++ WEBUI_JOB_SERVER_PORT=3000
++ KUE_UI_PORT=3002
++ WEBUI_HTTP_LISTEN_PORT=8180
++ WEBUI_HTTPS_LISTEN_PORT=8143
++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem
++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem
++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA
++ WEBUI_STATIC_AUTH_USER=admin
++ WEBUI_STATIC_AUTH_PASSWORD=contrail123
++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin
++ XMPP_SERVER_PORT=5269
++ XMPP_SSL_ENABLE=false
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ LINKLOCAL_SERVICE_PORT=80
++ LINKLOCAL_SERVICE_NAME=metadata
++ LINKLOCAL_SERVICE_IP=169.254.169.254
++ IPFABRIC_SERVICE_PORT=8775
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ INTROSPECT_LISTEN_ALL=True
++ SANDESH_SSL_ENABLE=false
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_KEYFILE=
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ CONFIGURE_IPTABLES=false
++ FWAAS_ENABLE=False
++ CONTAINERD_NAMESPACE=k8s.io
++ TOR_AGENT_OVS_KA=10000
++ TOR_TYPE=ovs
++ TOR_OVS_PROTOCOL=tcp
++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ [[ /v3 == \/\v\2\.\0 ]]
++ [[ openstack == \o\p\e\n\s\t\a\c\k ]]
++ AUTH_MODE=keystone
++ [[ keystone == \k\e\y\s\t\o\n\e ]]
++ AUTH_PARAMS='--admin_password contrail123'
++ AUTH_PARAMS+=' --admin_tenant_name admin'
++ AUTH_PARAMS+=' --admin_user admin'
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ read -r -d '' sandesh_client_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ xmpp_certs_config=
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ analytics_api_ssl_opts=
++ read -r -d '' rabbitmq_config
++ true
++ read -r -d '' rabbit_config
++ true
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ is_enabled false
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ kafka_ssl_config=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z '' ]]
++ is_enabled False
++ local val=false
++ [[ false == \t\r\u\e ]]
++ [[ false == \y\e\s ]]
++ [[ false == \e\n\a\b\l\e\d ]]
++ export TSN_AGENT_MODE=
++ TSN_AGENT_MODE=
++ [[ -n '' ]]
++ collector_stats_config=
++ [[ -z x ]]
++ RSYSLOGD_XFLOW_LISTEN_PORT=9898
+ source /agent-functions.sh
++ source /network-functions-vrouter-kernel
+++ . ./network-functions-vrouter
++++ export L3MH_VRRP_MAC=00:00:5e:00:01:00
++++ L3MH_VRRP_MAC=00:00:5e:00:01:00
++ REQUIRED_KERNEL_VROUTER_ENCRYPTION=4.4.0
+ set_traps
+ echo 'INFO: Start set_traps'
INFO: Start set_traps
+ echo 91088
+ trap trap_vrouter_agent_quit SIGQUIT
+ trap trap_vrouter_agent_term SIGTERM SIGINT
+ trap trap_vrouter_agent_hup SIGHUP
+ mkdir -p /var/lib/contrail/dhcp /var/lib/contrail/backup
+ chmod 0750 /var/lib/contrail/dhcp /var/lib/contrail/backup
+ vhost0_init
+ echo 'INFO: Start vhost0_init'
INFO: Start vhost0_init
+ pre_start_init
+ wait_certs_if_ssl_enabled
+ is_ssl_enabled
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ return
++ cat /contrail_build_version
+ export BUILD_VERSION=nightly
+ BUILD_VERSION=nightly
+ export KERNEL_INIT_VHOST0=true
+ KERNEL_INIT_VHOST0=true
+ is_dpdk
+ test kernel == dpdk
+ is_enabled true
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local res=0
+ [[ -n '' ]]
+ init_vhost0
+ check_vhost0
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
Device "vhost0" does not exist.
+ '[' -n '' ']'
+ return 1
+ declare phys_int phys_int_mac addrs bind_type bind_int mtu routes
+ is_dpdk
+ test kernel == dpdk
+ IFS=' '
+ read -r phys_int phys_int_mac
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
cat: /sys/class/net/vhost0/address: No such file or directory
++ local mac=
++ [[ -n '' ]]
+++ get_vrouter_physical_iface
+++ local iface=
+++ [[ -z '' ]]
++++ get_iface_for_vrouter_from_control
++++ local node_ip
++++ [[ -n '' ]]
+++++ echo
++++ node_ip=
++++ [[ -z '' ]]
+++++ resolve_1st_control_node_ip
++++++ echo 10.20.0.192
++++++ cut -d , -f 1
+++++ local first_item=10.20.0.192
+++++ resolve_host_ip 10.20.0.192
+++++ local name_or_ip=10.20.0.192
+++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++++ node_ip=10.20.0.192
+++++ get_gateway_nic_for_ip 10.20.0.192
+++++ command -v ip
+++++ local ip=10.20.0.192
++++++ ip route get 10.20.0.192
++++++ grep -o 'dev.*'
++++++ awk '{print $2}'
+++++ local iface=lo
+++++ [[ lo == \l\o ]]
++++++ ip address show
++++++ grep -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
++++++ grep -m 1 vhost0
+++++ iface=
+++++ '[' -z '' ']'
++++++ ip address show
++++++ grep -m 1 -F 'inet 10.20.0.192/'
++++++ awk '{print($NF)}'
+++++ iface=ens6
+++++ echo ens6
++++ local iface=ens6
++++ echo ens6
+++ iface=ens6
+++ [[ -z ens6 ]]
+++ echo ens6
++ nic=ens6
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
+ '[' -z '' ']'
++ get_addrs_for_nic ens6
++ local nic=ens6
++ ip addr show dev ens6
++ grep inet
++ grep -oP '[0-9a-f\:\.]*/[0-9]* brd [0-9\.]*|[0-9a-f\:\.]*/[0-9]*'
+ addrs='10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
++ get_iface_mtu ens6
++ local nic=ens6
++ cat /sys/class/net/ens6/mtu
+ mtu=1500
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
++ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ routes='10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e'
INFO: creating vhost0 for nic mode: nic: ens6, mac=fa:16:3e:02:69:1e
+ create_vhost0 ens6 fa:16:3e:02:69:1e
+ local phys_int=ens6
+ local phys_int_mac=fa:16:3e:02:69:1e
+ local vhost0_mac=fa:16:3e:02:69:1e
+ pkt_create_configs
+ [[ -d /etc/sysconfig/network-scripts ]]
+ load_vrouter
+ lsmod
+ grep -q vrouter
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.5G         19G         40M        3.2G         22G
Swap:            0B          0B          0B
+ sync
+ echo 2
+ free -h
              total        used        free      shared  buff/cache   available
Mem:            31G        8.5G         19G         40M        3.1G         22G
Swap:            0B          0B          0B
+ local vrouter_opts=
+ vrouter_opts=
+ load_kernel_module vrouter
+ local module=vrouter
+ shift 1
+ local opts=
+ echo 'INFO: load vrouter kernel module, options='\'''\'''
INFO: load vrouter kernel module, options=''
+ modprobe -v vrouter
insmod /lib/modules/5.15.0-100-generic/updates/dkms/vrouter.ko 
+ pkt_setup pkt1
+ '[' '!' -f /sys/class/net/pkt1/queues/rx-0/rps_cpus ']'
+ declare q r s mask str i
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt1/queues/rx-0
++ cut -d - -f2
+ q=0
+ r=0
+ s=0
+ (( mask=1<<0 ))
+ str=(`printf "%x" $mask`)
++ printf %x 1
+ '[' 0 -gt 0 ']'
+ echo 1
++ cat /sys/class/net/pkt1/queues/rx-0/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt1/queues/rx-0/rps_cpus\n01'
INFO: /sys/class/net/pkt1/queues/rx-0/rps_cpus
01
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt1/queues/rx-1
++ cut -d - -f2
+ q=1
+ r=1
+ s=0
+ (( mask=1<<1 ))
+ str=(`printf "%x" $mask`)
++ printf %x 2
+ '[' 0 -gt 0 ']'
+ echo 2
++ cat /sys/class/net/pkt1/queues/rx-1/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt1/queues/rx-1/rps_cpus\n02'
INFO: /sys/class/net/pkt1/queues/rx-1/rps_cpus
02
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt1/queues/rx-2
++ cut -d - -f2
+ q=2
+ r=2
+ s=0
+ (( mask=1<<2 ))
+ str=(`printf "%x" $mask`)
++ printf %x 4
+ '[' 0 -gt 0 ']'
+ echo 4
++ cat /sys/class/net/pkt1/queues/rx-2/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt1/queues/rx-2/rps_cpus\n04'
INFO: /sys/class/net/pkt1/queues/rx-2/rps_cpus
04
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt1/queues/rx-3
++ cut -d - -f2
+ q=3
+ r=3
+ s=0
+ (( mask=1<<3 ))
+ str=(`printf "%x" $mask`)
++ printf %x 8
+ '[' 0 -gt 0 ']'
+ echo 8
++ cat /sys/class/net/pkt1/queues/rx-3/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt1/queues/rx-3/rps_cpus\n08'
INFO: /sys/class/net/pkt1/queues/rx-3/rps_cpus
08
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt1/queues/rx-4
++ cut -d - -f2
+ q=4
+ r=4
+ s=0
+ (( mask=1<<4 ))
+ str=(`printf "%x" $mask`)
++ printf %x 16
+ '[' 0 -gt 0 ']'
+ echo 10
++ cat /sys/class/net/pkt1/queues/rx-4/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt1/queues/rx-4/rps_cpus\n10'
INFO: /sys/class/net/pkt1/queues/rx-4/rps_cpus
10
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt1/queues/rx-5
++ cut -d - -f2
+ q=5
+ r=5
+ s=0
+ (( mask=1<<5 ))
+ str=(`printf "%x" $mask`)
++ printf %x 32
+ '[' 0 -gt 0 ']'
+ echo 20
++ cat /sys/class/net/pkt1/queues/rx-5/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt1/queues/rx-5/rps_cpus\n20'
INFO: /sys/class/net/pkt1/queues/rx-5/rps_cpus
20
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt1/queues/rx-6
++ cut -d - -f2
+ q=6
+ r=6
+ s=0
+ (( mask=1<<6 ))
+ str=(`printf "%x" $mask`)
++ printf %x 64
+ '[' 0 -gt 0 ']'
+ echo 40
++ cat /sys/class/net/pkt1/queues/rx-6/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt1/queues/rx-6/rps_cpus\n40'
INFO: /sys/class/net/pkt1/queues/rx-6/rps_cpus
40
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt1/queues/rx-7
++ cut -d - -f2
+ q=7
+ r=7
+ s=0
+ (( mask=1<<7 ))
+ str=(`printf "%x" $mask`)
++ printf %x 128
+ '[' 0 -gt 0 ']'
+ echo 80
++ cat /sys/class/net/pkt1/queues/rx-7/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt1/queues/rx-7/rps_cpus\n80'
INFO: /sys/class/net/pkt1/queues/rx-7/rps_cpus
80
+ ip link set dev pkt1 up
+ pkt_setup pkt2
+ '[' '!' -f /sys/class/net/pkt2/queues/rx-0/rps_cpus ']'
+ declare q r s mask str i
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt2/queues/rx-0
++ cut -d - -f2
+ q=0
+ r=0
+ s=0
+ (( mask=1<<0 ))
+ str=(`printf "%x" $mask`)
++ printf %x 1
+ '[' 0 -gt 0 ']'
+ echo 1
++ cat /sys/class/net/pkt2/queues/rx-0/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt2/queues/rx-0/rps_cpus\n01'
INFO: /sys/class/net/pkt2/queues/rx-0/rps_cpus
01
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt2/queues/rx-1
++ cut -d - -f2
+ q=1
+ r=1
+ s=0
+ (( mask=1<<1 ))
+ str=(`printf "%x" $mask`)
++ printf %x 2
+ '[' 0 -gt 0 ']'
+ echo 2
++ cat /sys/class/net/pkt2/queues/rx-1/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt2/queues/rx-1/rps_cpus\n02'
INFO: /sys/class/net/pkt2/queues/rx-1/rps_cpus
02
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt2/queues/rx-2
++ cut -d - -f2
+ q=2
+ r=2
+ s=0
+ (( mask=1<<2 ))
+ str=(`printf "%x" $mask`)
++ printf %x 4
+ '[' 0 -gt 0 ']'
+ echo 4
++ cat /sys/class/net/pkt2/queues/rx-2/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt2/queues/rx-2/rps_cpus\n04'
INFO: /sys/class/net/pkt2/queues/rx-2/rps_cpus
04
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt2/queues/rx-3
++ cut -d - -f2
+ q=3
+ r=3
+ s=0
+ (( mask=1<<3 ))
+ str=(`printf "%x" $mask`)
++ printf %x 8
+ '[' 0 -gt 0 ']'
+ echo 8
++ cat /sys/class/net/pkt2/queues/rx-3/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt2/queues/rx-3/rps_cpus\n08'
INFO: /sys/class/net/pkt2/queues/rx-3/rps_cpus
08
+ for f in '/sys/class/net/$1/queues/rx-*'
++ cut -d - -f2
++ echo /sys/class/net/pkt2/queues/rx-4
+ q=4
+ r=4
+ s=0
+ (( mask=1<<4 ))
+ str=(`printf "%x" $mask`)
++ printf %x 16
+ '[' 0 -gt 0 ']'
+ echo 10
++ cat /sys/class/net/pkt2/queues/rx-4/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt2/queues/rx-4/rps_cpus\n10'
INFO: /sys/class/net/pkt2/queues/rx-4/rps_cpus
10
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt2/queues/rx-5
++ cut -d - -f2
+ q=5
+ r=5
+ s=0
+ (( mask=1<<5 ))
+ str=(`printf "%x" $mask`)
++ printf %x 32
+ '[' 0 -gt 0 ']'
+ echo 20
++ cat /sys/class/net/pkt2/queues/rx-5/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt2/queues/rx-5/rps_cpus\n20'
INFO: /sys/class/net/pkt2/queues/rx-5/rps_cpus
20
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt2/queues/rx-6
++ cut -d - -f2
+ q=6
+ r=6
+ s=0
+ (( mask=1<<6 ))
+ str=(`printf "%x" $mask`)
++ printf %x 64
+ '[' 0 -gt 0 ']'
+ echo 40
++ cat /sys/class/net/pkt2/queues/rx-6/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt2/queues/rx-6/rps_cpus\n40'
INFO: /sys/class/net/pkt2/queues/rx-6/rps_cpus
40
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt2/queues/rx-7
++ cut -d - -f2
+ q=7
+ r=7
+ s=0
+ (( mask=1<<7 ))
+ str=(`printf "%x" $mask`)
++ printf %x 128
+ '[' 0 -gt 0 ']'
+ echo 80
++ cat /sys/class/net/pkt2/queues/rx-7/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt2/queues/rx-7/rps_cpus\n80'
INFO: /sys/class/net/pkt2/queues/rx-7/rps_cpus
80
+ ip link set dev pkt2 up
+ pkt_setup pkt3
+ '[' '!' -f /sys/class/net/pkt3/queues/rx-0/rps_cpus ']'
+ declare q r s mask str i
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt3/queues/rx-0
++ cut -d - -f2
+ q=0
+ r=0
+ s=0
+ (( mask=1<<0 ))
+ str=(`printf "%x" $mask`)
++ printf %x 1
+ '[' 0 -gt 0 ']'
+ echo 1
++ cat /sys/class/net/pkt3/queues/rx-0/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt3/queues/rx-0/rps_cpus\n01'
INFO: /sys/class/net/pkt3/queues/rx-0/rps_cpus
01
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt3/queues/rx-1
++ cut -d - -f2
+ q=1
+ r=1
+ s=0
+ (( mask=1<<1 ))
+ str=(`printf "%x" $mask`)
++ printf %x 2
+ '[' 0 -gt 0 ']'
+ echo 2
++ cat /sys/class/net/pkt3/queues/rx-1/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt3/queues/rx-1/rps_cpus\n02'
INFO: /sys/class/net/pkt3/queues/rx-1/rps_cpus
02
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt3/queues/rx-2
++ cut -d - -f2
+ q=2
+ r=2
+ s=0
+ (( mask=1<<2 ))
+ str=(`printf "%x" $mask`)
++ printf %x 4
+ '[' 0 -gt 0 ']'
+ echo 4
++ cat /sys/class/net/pkt3/queues/rx-2/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt3/queues/rx-2/rps_cpus\n04'
INFO: /sys/class/net/pkt3/queues/rx-2/rps_cpus
04
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt3/queues/rx-3
++ cut -d - -f2
+ q=3
+ r=3
+ s=0
+ (( mask=1<<3 ))
+ str=(`printf "%x" $mask`)
++ printf %x 8
+ '[' 0 -gt 0 ']'
+ echo 8
++ cat /sys/class/net/pkt3/queues/rx-3/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt3/queues/rx-3/rps_cpus\n08'
INFO: /sys/class/net/pkt3/queues/rx-3/rps_cpus
08
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt3/queues/rx-4
++ cut -d - -f2
+ q=4
+ r=4
+ s=0
+ (( mask=1<<4 ))
+ str=(`printf "%x" $mask`)
++ printf %x 16
+ '[' 0 -gt 0 ']'
+ echo 10
++ cat /sys/class/net/pkt3/queues/rx-4/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt3/queues/rx-4/rps_cpus\n10'
INFO: /sys/class/net/pkt3/queues/rx-4/rps_cpus
10
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt3/queues/rx-5
++ cut -d - -f2
+ q=5
+ r=5
+ s=0
+ (( mask=1<<5 ))
+ str=(`printf "%x" $mask`)
++ printf %x 32
+ '[' 0 -gt 0 ']'
+ echo 20
++ cat /sys/class/net/pkt3/queues/rx-5/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt3/queues/rx-5/rps_cpus\n20'
INFO: /sys/class/net/pkt3/queues/rx-5/rps_cpus
20
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt3/queues/rx-6
++ cut -d - -f2
+ q=6
+ r=6
+ s=0
+ (( mask=1<<6 ))
+ str=(`printf "%x" $mask`)
++ printf %x 64
+ '[' 0 -gt 0 ']'
+ echo 40
++ cat /sys/class/net/pkt3/queues/rx-6/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt3/queues/rx-6/rps_cpus\n40'
INFO: /sys/class/net/pkt3/queues/rx-6/rps_cpus
40
+ for f in '/sys/class/net/$1/queues/rx-*'
++ echo /sys/class/net/pkt3/queues/rx-7
++ cut -d - -f2
+ q=7
+ r=7
+ s=0
+ (( mask=1<<7 ))
+ str=(`printf "%x" $mask`)
++ printf %x 128
+ '[' 0 -gt 0 ']'
+ echo 80
++ cat /sys/class/net/pkt3/queues/rx-7/rps_cpus
+ echo -e 'INFO: /sys/class/net/pkt3/queues/rx-7/rps_cpus\n80'
INFO: /sys/class/net/pkt3/queues/rx-7/rps_cpus
80
+ ip link set dev pkt3 up
+ vif --create vhost0 --mac fa:16:3e:02:69:1e
+ phys_int_arr=($(echo $phys_int | tr ',' ' '))
++ echo ens6
++ tr , ' '
+ local phys_int_arr
+ phys_int_mac_arr=($(echo $phys_int_mac | tr ',' ' '))
++ echo fa:16:3e:02:69:1e
++ tr , ' '
+ local phys_int_mac_arr
+ local i=1
+ (( i-- ))
+ (( i>=0 ))
+ vif --add ens6 --mac fa:16:3e:02:69:1e --vrf 0 --vhost-phys --type physical
+ (( i-- ))
+ (( i>=0 ))
+ vif --add vhost0 --mac fa:16:3e:02:69:1e --vrf 0 --type vhost --xconnect ens6
+ ip link set dev vhost0 address fa:16:3e:02:69:1e
+ ip link set dev vhost0 up
+ bind_type=kernel
+ bind_int=ens6
+ local ret=0
+ [[ -e /etc/sysconfig/network-scripts/ifcfg-ens6 ]]
+ [[ -e /etc/sysconfig/network-scripts/contrail.org.ifcfg-ens6 ]]
+ [[ -e /etc/sysconfig/network-scripts/ifcfg-vhost0 ]]
+ echo 'INFO: there is no ifcfg-ens6 and ifcfg-vhost0, so initialize vhost0 manually'
INFO: there is no ifcfg-ens6 and ifcfg-vhost0, so initialize vhost0 manually
+ is_dpdk
+ test kernel == dpdk
+ kill_dhcp_clients ens6
+ local phys_int=ens6
++ get_dhcp_client_pids ens6
+++ ps -A -o pid,cmd
+++ grep dhclient
+++ grep ens6
+++ grep -v grep
+++ awk '{print $1}'
++ local pids=
++ echo
+ local dhcpcl_id=
+ '[' -n '' ']'
+ echo 'INFO: Changing physical interface to vhost in ip table'
INFO: Changing physical interface to vhost in ip table
+ echo '10.20.0.192/24 brd 10.20.0.255
fe80::f816:3eff:fe02:691e/64'
+ IFS=
+ read -r line
+ is_dpdk
+ test kernel == dpdk
++ echo 10.20.0.192/24 brd 10.20.0.255
++ cut -d ' ' -f 1
+ local addr_to_del=10.20.0.192/24
+ ip address delete 10.20.0.192/24 dev ens6
++ echo 10.20.0.192/24 brd 10.20.0.255
++ sed s/brd/broadcast/
+ local 'addr_to_add=10.20.0.192/24 broadcast 10.20.0.255'
+ ip address add 10.20.0.192/24 broadcast 10.20.0.255 dev vhost0
+ IFS=
+ read -r line
+ is_dpdk
+ test kernel == dpdk
++ echo fe80::f816:3eff:fe02:691e/64
++ cut -d ' ' -f 1
+ local addr_to_del=fe80::f816:3eff:fe02:691e/64
+ ip address delete fe80::f816:3eff:fe02:691e/64 dev ens6
++ echo fe80::f816:3eff:fe02:691e/64
++ sed s/brd/broadcast/
+ local addr_to_add=fe80::f816:3eff:fe02:691e/64
+ ip address add fe80::f816:3eff:fe02:691e/64 dev vhost0
RTNETLINK answers: File exists
+ echo 'ERROR: failed to add address fe80::f816:3eff:fe02:691e/64 to vhost0.'
ERROR: failed to add address fe80::f816:3eff:fe02:691e/64 to vhost0.
+ ret=1
+ IFS=
+ read -r line
+ [[ -n 1500 ]]
+ echo 'INFO: set mtu'
INFO: set mtu
+ ip link set dev vhost0 mtu 1500
+ '[' -n 1500 ']'
+ check_physical_mtu 1500 ens6
+ local mtu=1500
+ local phys_int=ens6
++ cat /sys/class/net/ens6/mtu
+ local mtu_after_vhost=1500
+ [[ 1500 != \1\5\0\0 ]]
+ set_dev_routes vhost0 '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ local dev=vhost0
+ local 'routes_list=10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ '[' -n '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 ' ']'
+ local route
+ IFS=
+ read -r route
++ echo '10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 '
+ echo 'INFO: ip route replace 10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100  dev vhost0'
INFO: ip route replace 10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100  dev vhost0
+ ip route replace 10.20.0.0/24 proto kernel scope link src 10.20.0.192 metric 100 dev vhost0
+ IFS=
+ read -r route
+ is_dpdk
+ test kernel == dpdk
++ get_dev_routes ens6
++ local dev=ens6
+++ ip route list dev ens6
+++ grep -v default
++ local routes_list=
++ '[' -n '' ']'
+++ ip route list dev ens6
+++ grep default
++ routes_list=
++ '[' -n '' ']'
+ local _phys_int_routes=
+ del_dev_routes ens6 ''
+ local dev=ens6
+ local routes_list=
+ '[' -n '' ']'
+ [[ 0 == 0 ]]
+ ensure_host_resolv_conf
+ local path=/etc/resolv.conf
+ local host_path=/host/etc/resolv.conf
+ [[ -e /etc/resolv.conf ]]
+ [[ -e /host/etc/resolv.conf ]]
+ diff -U 3 /host/etc/resolv.conf /etc/resolv.conf
+ dbg_trace_agent_vers
+ local agent_ver=nightly
++ cat /sys/module/vrouter/version
+ local loaded_vrouter_ver=nightly
++ modinfo -F version vrouter
+ local available_vrouter_ver=nightly
+ echo 'INFO: versions: agent=nightly, loaded_vrouter=nightly, available_vrouter=nightly'
INFO: versions: agent=nightly, loaded_vrouter=nightly, available_vrouter=nightly
+ return 0
+ [[ 0 != 0 ]]
+ '[' -e /etc/dhcp/dhclient.conf ']'
++ cat /sys/devices/virtual/dmi/id/chassis_vendor
++ cat /sys/devices/virtual/dmi/id/product_version
+ azure_or_gcp_or_aws='Red Hat
15.52.9-1.cmpt.el7'
+ [[ red hat
15.52.9-1.cmpt.el7 =~ ^(.*microsoft*.|.*google*.|.*amazon*.) ]]
+ check_vrouter_agent_settings
+ '[' -n '' ']'
+ nodes=(`echo $CONTROL_NODES | tr ',' ' '`)
++ echo 10.20.0.192
++ tr , ' '
+ local nodes
+ [[ 11 == 0 ]]
++ resolve_host_ip 10.20.0.192
++ local name_or_ip=10.20.0.192
++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
+ local resolved_ip=10.20.0.192
++ get_gateway_nic_for_ip 10.20.0.192
++ command -v ip
++ local ip=10.20.0.192
+++ ip route get 10.20.0.192
+++ grep -o 'dev.*'
+++ awk '{print $2}'
++ local iface=lo
++ [[ lo == \l\o ]]
+++ ip address show
+++ grep -F 'inet 10.20.0.192/'
+++ awk '{print($NF)}'
+++ grep -m 1 vhost0
++ iface=vhost0
++ '[' -z vhost0 ']'
++ echo vhost0
+ local iface=vhost0
+ [[ vhost0 != \v\h\o\s\t\0 ]]
+ ((  11 > 1  ))
+ for node in '${nodes[@]}'
++ resolve_host_ip 10.20.0.192
++ local name_or_ip=10.20.0.192
++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
+ local resolved_ip=10.20.0.192
++ get_gateway_nic_for_ip 10.20.0.192
++ command -v ip
++ local ip=10.20.0.192
+++ ip route get 10.20.0.192
+++ grep -o 'dev.*'
+++ awk '{print $2}'
++ local iface=lo
++ [[ lo == \l\o ]]
+++ ip address show
+++ grep -F 'inet 10.20.0.192/'
+++ awk '{print($NF)}'
+++ grep -m 1 vhost0
++ iface=vhost0
++ '[' -z vhost0 ']'
++ echo vhost0
+ local cur_iface=vhost0
+ [[ vhost0 != \v\h\o\s\t\0 ]]
+ return 0
+ is_encryption_supported
+ local enc=False
+ [[ FALSE == \F\A\L\S\E ]]
+ return 1
+ echo 'INFO: Kernel version does not support the driver required for vrouter to vrouter encryption'
INFO: Kernel version does not support the driver required for vrouter to vrouter encryption
+ init_sriov
+ [[ -z '' ]]
+ [[ -z '' ]]
+ echo 'INFO: sriov parameters are not provided'
INFO: sriov parameters are not provided
+ return
+ wait_vhost0
+ local max=60
+ local pause=5
+ local i=0
+ local 'grep_str=inet '
+ [[ -n '' ]]
+ (( i=0 ))
+ (( i<max ))
+ echo 'INFO: wait vhost0 to be initilaized... 0/60'
INFO: wait vhost0 to be initilaized... 0/60
+ ip addr show dev vhost0
+ grep -q 'inet '
+ echo 'INFO: vhost0 is ready.'
INFO: vhost0 is ready.
+ return 0
+ prepare_agent_config_vars /usr/bin/contrail-vrouter-agent
+ echo 'INFO: Start prepare_agent_config_vars'
INFO: Start prepare_agent_config_vars
+ local VROUTER_CIDR=
+ local vrouter_ip
+ [[ -z '' ]]
++ get_cidr_for_nic vhost0
++ command -v ip
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
+ VROUTER_CIDR=10.20.0.192/24
+ [[ -z 10.20.0.192/24 ]]
+ echo 'INFO: vhost0 cidr 10.20.0.192/24'
INFO: vhost0 cidr 10.20.0.192/24
+ vrouter_ip=10.20.0.192
+ local PHYS_INT_MAC PHYS_INT PCI_ADDRESS PHYS_INT_IPS
+ is_dpdk
+ test kernel == dpdk
+ '[' -n '' ']'
+ IFS=' '
+ read -r PHYS_INT PHYS_INT_MAC
++ get_physical_nic_and_mac
++ local nic=vhost0
+++ get_iface_mac vhost0
+++ local nic=vhost0
+++ cat /sys/class/net/vhost0/address
++ local mac=fa:16:3e:02:69:1e
++ [[ -n fa:16:3e:02:69:1e ]]
+++ vif --list
+++ grep 'Type:Physical HWaddr:fa:16:3e:02:69:1e' -B1
+++ head -1
+++ awk '{print($3)}'
++ nic=ens6
++ [[ -z ens6 ]]
++ [[ -n ens6 ]]
++ [[ ! ens6 =~ ^[0-9] ]]
+++ get_iface_mac ens6
+++ local nic=ens6
+++ cat /sys/class/net/ens6/address
++ local _mac=fa:16:3e:02:69:1e
++ [[ -n fa:16:3e:02:69:1e ]]
++ mac=fa:16:3e:02:69:1e
++ [[ ens6 == '' ]]
++ [[ fa:16:3e:02:69:1e == '' ]]
++ [[ ens6 == \v\h\o\s\t\0 ]]
++ echo ens6 fa:16:3e:02:69:1e
++ get_pci_address_for_nic ens6
++ local nic=ens6
++ is_vlan ens6
++ local dev=ens6
++ '[' -f /proc/net/vlan/ens6 ']'
++ is_bonding ens6
++ local dev=ens6
++ '[' -d /sys/class/net/ens6/bonding ']'
++ ethtool -i ens6
++ grep bus-info
++ awk '{print $2}'
++ tr -d ' '
+ PCI_ADDRESS=0000:00:06.0
+ [[ -z ens6 ]]
+ [[ -z fa:16:3e:02:69:1e ]]
+ echo 'INFO: Physical interface: ens6, mac=fa:16:3e:02:69:1e, pci=0000:00:06.0'
INFO: Physical interface: ens6, mac=fa:16:3e:02:69:1e, pci=0000:00:06.0
++ get_default_vrouter_gateway
+++ resolve_1st_control_node_ip
++++ echo 10.20.0.192
++++ cut -d , -f 1
+++ local first_item=10.20.0.192
+++ resolve_host_ip 10.20.0.192
+++ local name_or_ip=10.20.0.192
+++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
++ local node_ip=10.20.0.192
+++ get_gateway_nic_for_ip 10.20.0.192
+++ command -v ip
+++ local ip=10.20.0.192
++++ ip route get 10.20.0.192
++++ grep -o 'dev.*'
++++ awk '{print $2}'
+++ local iface=lo
+++ [[ lo == \l\o ]]
++++ ip address show
++++ grep -F 'inet 10.20.0.192/'
++++ awk '{print($NF)}'
++++ grep -m 1 vhost0
+++ iface=vhost0
+++ '[' -z vhost0 ']'
+++ echo vhost0
++ local gw=vhost0
++ get_default_gateway_for_nic vhost0
++ local nic=vhost0
++ ip route show dev vhost0
++ grep default
++ head -n 1
++ awk '{print $3}'
+ VROUTER_GATEWAY=
+ [[ -z '' ]]
++ get_default_nic
++ get_gateway_nic_for_ip 1
++ command -v ip
++ local ip=1
+++ ip route get 1
+++ grep -o 'dev.*'
+++ awk '{print $2}'
++ local iface=ens3
++ [[ ens3 == \l\o ]]
++ echo ens3
+ local def_nic=ens3
+ [[ -z ens3 ]]
+ [[ ens3 == \v\h\o\s\t\0 ]]
+ echo 'INFO: vrouter gateway: '
INFO: vrouter gateway: 
+ '[' openstack == kubernetes ']'
+ HYPERVISOR_TYPE=kvm
++ resolve_hostname_by_ip 10.20.0.192
++ local ip=10.20.0.192
+++ getent hosts 10.20.0.192
+++ head -n 1
++ local 'host_entry=10.0.0.38       cn-jenkins-deploy-platform-ansible-os-3231-1'
++ local name=
++ [[ -n 10.0.0.38       cn-jenkins-deploy-platform-ansible-os-3231-1 ]]
+++ echo 10.0.0.38 cn-jenkins-deploy-platform-ansible-os-3231-1
+++ awk '{print $2}'
++ name=cn-jenkins-deploy-platform-ansible-os-3231-1
++ [[ -n cn-jenkins-deploy-platform-ansible-os-3231-1 ]]
++ echo cn-jenkins-deploy-platform-ansible-os-3231-1
+ local AGENT_NAME=cn-jenkins-deploy-platform-ansible-os-3231-1
+ '[' -z cn-jenkins-deploy-platform-ansible-os-3231-1 ']'
++ cat /sys/devices/virtual/dmi/id/chassis_vendor
+ local 'gcp=Red Hat'
+ '[' 'Red Hat' == Google ']'
+ local IS_VLAN_ENABLED IS_ENCRYPTION_SUPPORTED_FLAG
+ is_vlan ens6
+ local dev=ens6
+ '[' -f /proc/net/vlan/ens6 ']'
+ IS_VLAN_ENABLED=false
+ is_encryption_supported
+ local enc=False
+ [[ FALSE == \F\A\L\S\E ]]
+ return 1
+ IS_ENCRYPTION_SUPPORTED_FLAG=false
+ local hugepages_option=
+ local HUGEPAGES_DIR allocated_pages_1GB allocated_pages_2MB
+ ((  HUGE_PAGES_1GB > 0  ))
+ ((  HUGE_PAGES_2MB > 0  ))
+ HUGEPAGES_DIR=/dev/hugepages
+ ensure_hugepages /dev/hugepages
+ local hp_dir=/dev/hugepages
+ hp_dir=/dev/hugepages
+ local mp
+ local fs
++ mount -t hugetlbfs
++ awk '{print($3)}'
+ for mp in '$(mount -t hugetlbfs | awk '\''{print($3)}'\'')'
+ [[ /dev/hugepages == \/\d\e\v\/\h\u\g\e\p\a\g\e\s ]]
+ return
++ cat /sys/kernel/mm/hugepages/hugepages-2048kB/nr_hugepages
+ allocated_pages_2MB=0
+ echo 'INFO: Requested HP2MB  256 available 0'
INFO: Requested HP2MB  256 available 0
+ ((  HUGE_PAGES_2MB > allocated_pages_2MB  ))
+ echo 'INFO: Requested HP2MB  256 more then available 0.. try to allocate'
INFO: Requested HP2MB  256 more then available 0.. try to allocate
+ echo 256
+ local INTROSPECT_IP=0.0.0.0
+ is_enabled True
+ local val=true
+ [[ true == \t\r\u\e ]]
+ local COMPUTE_NODE_ADDRESS
+ [[ -n '' ]]
+ COMPUTE_NODE_ADDRESS=10.20.0.192
++ get_server_list CONTROL ':5269 '
++ local server_typ=CONTROL_NODES
++ local 'port_with_delim=:5269 '
++ local server_list=
++ IFS=,
++ read -ra server_list
++ local extended_server_list=
++ for server in '"${server_list[@]}"'
+++ echo 10.20.0.192
++ local server_address=10.20.0.192
++ extended_server_list+='10.20.0.192:5269 '
++ '[' -n '10.20.0.192:5269 ' ']'
++ echo 10.20.0.192:5269
+ local XMPP_SERVERS_LIST=10.20.0.192:5269
++ get_ip_for_vrouter_from_control
+++ get_iface_for_vrouter_from_control
+++ local node_ip
+++ [[ -n '' ]]
++++ echo
+++ node_ip=
+++ [[ -z '' ]]
++++ resolve_1st_control_node_ip
+++++ echo 10.20.0.192
+++++ cut -d , -f 1
++++ local first_item=10.20.0.192
++++ resolve_host_ip 10.20.0.192
++++ local name_or_ip=10.20.0.192
++++ python3 -c 'import socket; print(socket.gethostbyname('\''10.20.0.192'\''))'
+++ node_ip=10.20.0.192
++++ get_gateway_nic_for_ip 10.20.0.192
++++ command -v ip
++++ local ip=10.20.0.192
+++++ ip route get 10.20.0.192
+++++ grep -o 'dev.*'
+++++ awk '{print $2}'
++++ local iface=lo
++++ [[ lo == \l\o ]]
+++++ ip address show
+++++ grep -F 'inet 10.20.0.192/'
+++++ awk '{print($NF)}'
+++++ grep -m 1 vhost0
++++ iface=vhost0
++++ '[' -z vhost0 ']'
++++ echo vhost0
+++ local iface=vhost0
+++ echo vhost0
++ local iface=vhost0
++ get_ip_for_nic vhost0
++ local nic=vhost0
++ get_cidr_for_nic vhost0
++ command -v ip
++ cut -d / -f 1
++ local nic=vhost0
++ ip addr show dev vhost0
++ grep 'inet '
++ awk '{print $2}'
++ head -n 1
+ local CONTROL_NETWORK_IP=10.20.0.192
++ get_server_list DNS ':53 '
++ local server_typ=DNS_NODES
++ local 'port_with_delim=:53 '
++ local server_list=
++ IFS=,
++ read -ra server_list
++ local extended_server_list=
++ for server in '"${server_list[@]}"'
+++ echo 10.20.0.192
++ local server_address=10.20.0.192
++ extended_server_list+='10.20.0.192:53 '
++ '[' -n '10.20.0.192:53 ' ']'
++ echo 10.20.0.192:53
+ local DNS_SERVERS_LIST=10.20.0.192:53
+ local k8s_token_file
+ [[ -z '' ]]
+ k8s_token_file=/var/run/secrets/kubernetes.io/serviceaccount/token
+ [[ -f /var/run/secrets/kubernetes.io/serviceaccount/token ]]
+ local result_params=
+ local key line
++ cat /parameters-template.sh
+ local 'params=AGENT_MODE=
AGENT_NAME=
AUTH_MODE=
BARBICAN_PASSWORD=
BARBICAN_TENANT_NAME=
BARBICAN_USER=
CLOUD_ORCHESTRATOR=
COLLECTOR_SERVERS=
COMPUTE_NODE_ADDRESS=
CONFIG_API_SERVER_CA_CERTFILE=
CONFIG_API_SSL_ENABLE=
CONFIG_NODES=
CONTAINER_LOG_DIR=
CONTROL_NETWORK_IP=
DEFAULT_LOCAL_IP=
DNS_SERVERS_LIST=
DPDK_UIO_DRIVER=
FABRIC_SNAT_HASH_TABLE_SIZE=
HUGEPAGES_DIR=
HUGE_PAGES_1GB=
HUGE_PAGES_2MB=
HYPERVISOR_TYPE=
INTROSPECT_IP=
INTROSPECT_SSL_ENABLE=
INTROSPECT_SSL_INSECURE=
IS_ENCRYPTION_SUPPORTED_FLAG=
IS_VLAN_ENABLED=
K8S_TOKEN=
KEYSTONE_AUTH_ADMIN_PORT=
KEYSTONE_AUTH_CA_CERTFILE=
KEYSTONE_AUTH_CERTFILE=
KEYSTONE_AUTH_HOST=
KEYSTONE_AUTH_INSECURE=
KEYSTONE_AUTH_KEYFILE=
KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=
KEYSTONE_AUTH_PROTO=
KEYSTONE_AUTH_REGION_NAME=
KEYSTONE_AUTH_REGION_NAME=
KEYSTONE_AUTH_URL_TOKENS=
KEYSTONE_AUTH_URL_VERSION=
KEYSTONE_AUTH_USER_DOMAIN_NAME=
KUBERNETES_API_PORT=
KUBERNETES_API_SECURE_PORT=
KUBERNETES_API_SERVER=
L3MH_CIDR=
LOG_LEVEL=
LOG_LOCAL=
METADATA_PROXY_SECRET=
METADATA_SSL_CA_CERTFILE=
METADATA_SSL_CERTFILE=
METADATA_SSL_CERT_TYPE=
METADATA_SSL_ENABLE=
METADATA_SSL_KEYFILE=
PCI_ADDRESS=
PHYS_INT=
PHYS_INT_MAC=
PHYS_INT_IPS=
PRIORITY_BANDWIDTH=
PRIORITY_ID=
PRIORITY_SCHEDULING=
PRIORITY_TAGGING=
QOS_DEF_HW_QUEUE=
QOS_LOGICAL_QUEUES=
QOS_QUEUE_ID=
SAMPLE_DESTINATION=
SANDESH_CA_CERTFILE=
SANDESH_CERTFILE=
SANDESH_KEYFILE=
SANDESH_SERVER_CERTFILE=
SANDESH_SERVER_KEYFILE=
SANDESH_SSL_ENABLE=
SLO_DESTINATION=
STATS_COLLECTOR_DESTINATION_PATH=
SUBCLUSTER=
TSN_AGENT_MODE=
TSN_NODES=
VROUTER_AGENT_INTROSPECT_PORT=
VROUTER_CIDR=
VROUTER_CRYPT_INTERFACE=
VROUTER_GATEWAY=
XMPP_SERVER_CA_CERTFILE=
XMPP_SERVER_CERTFILE=
XMPP_SERVER_KEYFILE=
XMPP_SERVERS_LIST=
XMPP_SSL_ENABLE='
+ read line
++ echo AGENT_MODE=
++ cut -d = -f 1
+ key=AGENT_MODE
+ [[ -n AGENT_MODE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo AGENT_NAME=
++ cut -d = -f 1
+ key=AGENT_NAME
+ [[ -n AGENT_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo AUTH_MODE=
++ cut -d = -f 1
+ key=AUTH_MODE
+ [[ -n AUTH_MODE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo BARBICAN_PASSWORD=
++ cut -d = -f 1
+ key=BARBICAN_PASSWORD
+ [[ -n BARBICAN_PASSWORD ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo BARBICAN_TENANT_NAME=
++ cut -d = -f 1
+ key=BARBICAN_TENANT_NAME
+ [[ -n BARBICAN_TENANT_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo BARBICAN_USER=
++ cut -d = -f 1
+ key=BARBICAN_USER
+ [[ -n BARBICAN_USER ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo CLOUD_ORCHESTRATOR=
++ cut -d = -f 1
+ key=CLOUD_ORCHESTRATOR
+ [[ -n CLOUD_ORCHESTRATOR ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo COLLECTOR_SERVERS=
++ cut -d = -f 1
+ key=COLLECTOR_SERVERS
+ [[ -n COLLECTOR_SERVERS ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo COMPUTE_NODE_ADDRESS=
++ cut -d = -f 1
+ key=COMPUTE_NODE_ADDRESS
+ [[ -n COMPUTE_NODE_ADDRESS ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo CONFIG_API_SERVER_CA_CERTFILE=
++ cut -d = -f 1
+ key=CONFIG_API_SERVER_CA_CERTFILE
+ [[ -n CONFIG_API_SERVER_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo CONFIG_API_SSL_ENABLE=
++ cut -d = -f 1
+ key=CONFIG_API_SSL_ENABLE
+ [[ -n CONFIG_API_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo CONFIG_NODES=
++ cut -d = -f 1
+ key=CONFIG_NODES
+ [[ -n CONFIG_NODES ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo CONTAINER_LOG_DIR=
++ cut -d = -f 1
+ key=CONTAINER_LOG_DIR
+ [[ -n CONTAINER_LOG_DIR ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo CONTROL_NETWORK_IP=
++ cut -d = -f 1
+ key=CONTROL_NETWORK_IP
+ [[ -n CONTROL_NETWORK_IP ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo DEFAULT_LOCAL_IP=
++ cut -d = -f 1
+ key=DEFAULT_LOCAL_IP
+ [[ -n DEFAULT_LOCAL_IP ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo DNS_SERVERS_LIST=
++ cut -d = -f 1
+ key=DNS_SERVERS_LIST
+ [[ -n DNS_SERVERS_LIST ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo DPDK_UIO_DRIVER=
++ cut -d = -f 1
+ key=DPDK_UIO_DRIVER
+ [[ -n DPDK_UIO_DRIVER ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo FABRIC_SNAT_HASH_TABLE_SIZE=
++ cut -d = -f 1
+ key=FABRIC_SNAT_HASH_TABLE_SIZE
+ [[ -n FABRIC_SNAT_HASH_TABLE_SIZE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo HUGEPAGES_DIR=
++ cut -d = -f 1
+ key=HUGEPAGES_DIR
+ [[ -n HUGEPAGES_DIR ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo HUGE_PAGES_1GB=
++ cut -d = -f 1
+ key=HUGE_PAGES_1GB
+ [[ -n HUGE_PAGES_1GB ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo HUGE_PAGES_2MB=
++ cut -d = -f 1
+ key=HUGE_PAGES_2MB
+ [[ -n HUGE_PAGES_2MB ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo HYPERVISOR_TYPE=
++ cut -d = -f 1
+ key=HYPERVISOR_TYPE
+ [[ -n HYPERVISOR_TYPE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo INTROSPECT_IP=
++ cut -d = -f 1
+ key=INTROSPECT_IP
+ [[ -n INTROSPECT_IP ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo INTROSPECT_SSL_ENABLE=
++ cut -d = -f 1
+ key=INTROSPECT_SSL_ENABLE
+ [[ -n INTROSPECT_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo INTROSPECT_SSL_INSECURE=
++ cut -d = -f 1
+ key=INTROSPECT_SSL_INSECURE
+ [[ -n INTROSPECT_SSL_INSECURE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo IS_ENCRYPTION_SUPPORTED_FLAG=
++ cut -d = -f 1
+ key=IS_ENCRYPTION_SUPPORTED_FLAG
+ [[ -n IS_ENCRYPTION_SUPPORTED_FLAG ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo IS_VLAN_ENABLED=
++ cut -d = -f 1
+ key=IS_VLAN_ENABLED
+ [[ -n IS_VLAN_ENABLED ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo K8S_TOKEN=
++ cut -d = -f 1
+ key=K8S_TOKEN
+ [[ -n K8S_TOKEN ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_ADMIN_PORT=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_ADMIN_PORT
+ [[ -n KEYSTONE_AUTH_ADMIN_PORT ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_CA_CERTFILE=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_CA_CERTFILE
+ [[ -n KEYSTONE_AUTH_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_CERTFILE=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_CERTFILE
+ [[ -n KEYSTONE_AUTH_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_HOST=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_HOST
+ [[ -n KEYSTONE_AUTH_HOST ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_INSECURE=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_INSECURE
+ [[ -n KEYSTONE_AUTH_INSECURE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_KEYFILE=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_KEYFILE
+ [[ -n KEYSTONE_AUTH_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_PROJECT_DOMAIN_NAME
+ [[ -n KEYSTONE_AUTH_PROJECT_DOMAIN_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_PROTO=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_PROTO
+ [[ -n KEYSTONE_AUTH_PROTO ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_REGION_NAME=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_REGION_NAME
+ [[ -n KEYSTONE_AUTH_REGION_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_REGION_NAME=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_REGION_NAME
+ [[ -n KEYSTONE_AUTH_REGION_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_URL_TOKENS=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_URL_TOKENS
+ [[ -n KEYSTONE_AUTH_URL_TOKENS ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_URL_VERSION=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_URL_VERSION
+ [[ -n KEYSTONE_AUTH_URL_VERSION ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KEYSTONE_AUTH_USER_DOMAIN_NAME=
++ cut -d = -f 1
+ key=KEYSTONE_AUTH_USER_DOMAIN_NAME
+ [[ -n KEYSTONE_AUTH_USER_DOMAIN_NAME ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KUBERNETES_API_PORT=
++ cut -d = -f 1
+ key=KUBERNETES_API_PORT
+ [[ -n KUBERNETES_API_PORT ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KUBERNETES_API_SECURE_PORT=
++ cut -d = -f 1
+ key=KUBERNETES_API_SECURE_PORT
+ [[ -n KUBERNETES_API_SECURE_PORT ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo KUBERNETES_API_SERVER=
++ cut -d = -f 1
+ key=KUBERNETES_API_SERVER
+ [[ -n KUBERNETES_API_SERVER ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo L3MH_CIDR=
++ cut -d = -f 1
+ key=L3MH_CIDR
+ [[ -n L3MH_CIDR ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo LOG_LEVEL=
++ cut -d = -f 1
+ key=LOG_LEVEL
+ [[ -n LOG_LEVEL ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo LOG_LOCAL=
++ cut -d = -f 1
+ key=LOG_LOCAL
+ [[ -n LOG_LOCAL ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo METADATA_PROXY_SECRET=
++ cut -d = -f 1
+ key=METADATA_PROXY_SECRET
+ [[ -n METADATA_PROXY_SECRET ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo METADATA_SSL_CA_CERTFILE=
++ cut -d = -f 1
+ key=METADATA_SSL_CA_CERTFILE
+ [[ -n METADATA_SSL_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo METADATA_SSL_CERTFILE=
++ cut -d = -f 1
+ key=METADATA_SSL_CERTFILE
+ [[ -n METADATA_SSL_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo METADATA_SSL_CERT_TYPE=
++ cut -d = -f 1
+ key=METADATA_SSL_CERT_TYPE
+ [[ -n METADATA_SSL_CERT_TYPE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo METADATA_SSL_ENABLE=
++ cut -d = -f 1
+ key=METADATA_SSL_ENABLE
+ [[ -n METADATA_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo METADATA_SSL_KEYFILE=
++ cut -d = -f 1
+ key=METADATA_SSL_KEYFILE
+ [[ -n METADATA_SSL_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PCI_ADDRESS=
++ cut -d = -f 1
+ key=PCI_ADDRESS
+ [[ -n PCI_ADDRESS ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PHYS_INT=
++ cut -d = -f 1
+ key=PHYS_INT
+ [[ -n PHYS_INT ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PHYS_INT_MAC=
++ cut -d = -f 1
+ key=PHYS_INT_MAC
+ [[ -n PHYS_INT_MAC ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PHYS_INT_IPS=
++ cut -d = -f 1
+ key=PHYS_INT_IPS
+ [[ -n PHYS_INT_IPS ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PRIORITY_BANDWIDTH=
++ cut -d = -f 1
+ key=PRIORITY_BANDWIDTH
+ [[ -n PRIORITY_BANDWIDTH ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PRIORITY_ID=
++ cut -d = -f 1
+ key=PRIORITY_ID
+ [[ -n PRIORITY_ID ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PRIORITY_SCHEDULING=
++ cut -d = -f 1
+ key=PRIORITY_SCHEDULING
+ [[ -n PRIORITY_SCHEDULING ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo PRIORITY_TAGGING=
++ cut -d = -f 1
+ key=PRIORITY_TAGGING
+ [[ -n PRIORITY_TAGGING ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo QOS_DEF_HW_QUEUE=
++ cut -d = -f 1
+ key=QOS_DEF_HW_QUEUE
+ [[ -n QOS_DEF_HW_QUEUE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo QOS_LOGICAL_QUEUES=
++ cut -d = -f 1
+ key=QOS_LOGICAL_QUEUES
+ [[ -n QOS_LOGICAL_QUEUES ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo QOS_QUEUE_ID=
++ cut -d = -f 1
+ key=QOS_QUEUE_ID
+ [[ -n QOS_QUEUE_ID ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SAMPLE_DESTINATION=
++ cut -d = -f 1
+ key=SAMPLE_DESTINATION
+ [[ -n SAMPLE_DESTINATION ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SANDESH_CA_CERTFILE=
++ cut -d = -f 1
+ key=SANDESH_CA_CERTFILE
+ [[ -n SANDESH_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SANDESH_CERTFILE=
++ cut -d = -f 1
+ key=SANDESH_CERTFILE
+ [[ -n SANDESH_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SANDESH_KEYFILE=
++ cut -d = -f 1
+ key=SANDESH_KEYFILE
+ [[ -n SANDESH_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SANDESH_SERVER_CERTFILE=
++ cut -d = -f 1
+ key=SANDESH_SERVER_CERTFILE
+ [[ -n SANDESH_SERVER_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SANDESH_SERVER_KEYFILE=
++ cut -d = -f 1
+ key=SANDESH_SERVER_KEYFILE
+ [[ -n SANDESH_SERVER_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SANDESH_SSL_ENABLE=
++ cut -d = -f 1
+ key=SANDESH_SSL_ENABLE
+ [[ -n SANDESH_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SLO_DESTINATION=
++ cut -d = -f 1
+ key=SLO_DESTINATION
+ [[ -n SLO_DESTINATION ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo STATS_COLLECTOR_DESTINATION_PATH=
++ cut -d = -f 1
+ key=STATS_COLLECTOR_DESTINATION_PATH
+ [[ -n STATS_COLLECTOR_DESTINATION_PATH ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo SUBCLUSTER=
++ cut -d = -f 1
+ key=SUBCLUSTER
+ [[ -n SUBCLUSTER ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo TSN_AGENT_MODE=
++ cut -d = -f 1
+ key=TSN_AGENT_MODE
+ [[ -n TSN_AGENT_MODE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo TSN_NODES=
++ cut -d = -f 1
+ key=TSN_NODES
+ [[ -n TSN_NODES ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo VROUTER_AGENT_INTROSPECT_PORT=
++ cut -d = -f 1
+ key=VROUTER_AGENT_INTROSPECT_PORT
+ [[ -n VROUTER_AGENT_INTROSPECT_PORT ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo VROUTER_CIDR=
++ cut -d = -f 1
+ key=VROUTER_CIDR
+ [[ -n VROUTER_CIDR ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo VROUTER_CRYPT_INTERFACE=
++ cut -d = -f 1
+ key=VROUTER_CRYPT_INTERFACE
+ [[ -n VROUTER_CRYPT_INTERFACE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo VROUTER_GATEWAY=
++ cut -d = -f 1
+ key=VROUTER_GATEWAY
+ [[ -n VROUTER_GATEWAY ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo XMPP_SERVER_CA_CERTFILE=
++ cut -d = -f 1
+ key=XMPP_SERVER_CA_CERTFILE
+ [[ -n XMPP_SERVER_CA_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo XMPP_SERVER_CERTFILE=
++ cut -d = -f 1
+ key=XMPP_SERVER_CERTFILE
+ [[ -n XMPP_SERVER_CERTFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo XMPP_SERVER_KEYFILE=
++ cut -d = -f 1
+ key=XMPP_SERVER_KEYFILE
+ [[ -n XMPP_SERVER_KEYFILE ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo XMPP_SERVERS_LIST=
++ cut -d = -f 1
+ key=XMPP_SERVERS_LIST
+ [[ -n XMPP_SERVERS_LIST ]]
+ read -r -d '' result_params
+ true
+ read line
++ echo XMPP_SSL_ENABLE=
++ cut -d = -f 1
+ key=XMPP_SSL_ENABLE
+ [[ -n XMPP_SSL_ENABLE ]]
+ read -r -d '' result_params
+ true
+ read line
++ mktemp --dry-run
+ local tname=/tmp/tmp.HFHYudCubI
+ echo 'AGENT_MODE="kernel"
AGENT_NAME="cn-jenkins-deploy-platform-ansible-os-3231-1"
AUTH_MODE="keystone"
BARBICAN_PASSWORD="contrail123"
BARBICAN_TENANT_NAME="service"
BARBICAN_USER="barbican"
CLOUD_ORCHESTRATOR="openstack"
COLLECTOR_SERVERS="10.0.0.38:8086"
COMPUTE_NODE_ADDRESS="10.20.0.192"
CONFIG_API_SERVER_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem"
CONFIG_API_SSL_ENABLE="false"
CONFIG_NODES="10.0.0.38"
CONTAINER_LOG_DIR="/var/log/contrail/vrouter-agent"
CONTROL_NETWORK_IP="10.20.0.192"
DEFAULT_LOCAL_IP="10.0.0.38"
DNS_SERVERS_LIST="10.20.0.192:53"
DPDK_UIO_DRIVER="uio_pci_generic"
FABRIC_SNAT_HASH_TABLE_SIZE="4096"
HUGEPAGES_DIR="/dev/hugepages"
HUGE_PAGES_1GB="0"
HUGE_PAGES_2MB="256"
HYPERVISOR_TYPE="kvm"
INTROSPECT_IP="0.0.0.0"
INTROSPECT_SSL_ENABLE="false"
INTROSPECT_SSL_INSECURE="True"
IS_ENCRYPTION_SUPPORTED_FLAG="false"
IS_VLAN_ENABLED="false"
K8S_TOKEN=""
KEYSTONE_AUTH_ADMIN_PORT="5000"
KEYSTONE_AUTH_CA_CERTFILE=""
KEYSTONE_AUTH_CERTFILE=""
KEYSTONE_AUTH_HOST="10.0.0.38"
KEYSTONE_AUTH_INSECURE="True"
KEYSTONE_AUTH_KEYFILE=""
KEYSTONE_AUTH_PROJECT_DOMAIN_NAME="Default"
KEYSTONE_AUTH_PROTO="http"
KEYSTONE_AUTH_REGION_NAME="RegionOne"
KEYSTONE_AUTH_REGION_NAME="RegionOne"
KEYSTONE_AUTH_URL_TOKENS="/v3/auth/tokens"
KEYSTONE_AUTH_URL_VERSION="/v3"
KEYSTONE_AUTH_USER_DOMAIN_NAME="Default"
KUBERNETES_API_PORT=""
KUBERNETES_API_SECURE_PORT=""
KUBERNETES_API_SERVER=""
L3MH_CIDR=""
LOG_LEVEL="SYS_DEBUG"
LOG_LOCAL="1"
METADATA_PROXY_SECRET="contrail"
METADATA_SSL_CA_CERTFILE=""
METADATA_SSL_CERTFILE=""
METADATA_SSL_CERT_TYPE=""
METADATA_SSL_ENABLE="false"
METADATA_SSL_KEYFILE=""
PCI_ADDRESS="0000:00:06.0"
PHYS_INT="ens6"
PHYS_INT_MAC="fa:16:3e:02:69:1e"
PHYS_INT_IPS=""
PRIORITY_BANDWIDTH=""
PRIORITY_ID=""
PRIORITY_SCHEDULING=""
PRIORITY_TAGGING="True"
QOS_DEF_HW_QUEUE="False"
QOS_LOGICAL_QUEUES=""
QOS_QUEUE_ID=""
SAMPLE_DESTINATION="collector"
SANDESH_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem"
SANDESH_CERTFILE="/etc/contrail/ssl/certs/server.pem"
SANDESH_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem"
SANDESH_SERVER_CERTFILE="/etc/contrail/ssl/certs/server.pem"
SANDESH_SERVER_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem"
SANDESH_SSL_ENABLE="false"
SLO_DESTINATION="collector"
STATS_COLLECTOR_DESTINATION_PATH=""
SUBCLUSTER=""
TSN_AGENT_MODE=""
TSN_NODES="[]"
VROUTER_AGENT_INTROSPECT_PORT=""
VROUTER_CIDR="10.20.0.192/24"
VROUTER_CRYPT_INTERFACE="crypt0"
VROUTER_GATEWAY=""
XMPP_SERVER_CA_CERTFILE="/etc/contrail/ssl/certs/ca-cert.pem"
XMPP_SERVER_CERTFILE="/etc/contrail/ssl/certs/server.pem"
XMPP_SERVER_KEYFILE="/etc/contrail/ssl/private/server-privkey.pem"
XMPP_SERVERS_LIST="10.20.0.192:5269"
XMPP_SSL_ENABLE="false"'
+ mv -f /tmp/tmp.HFHYudCubI /parameters.sh
++ mktemp --dry-run
+ tname=/tmp/tmp.YtgFoIOmUw
+ echo ready
+ mv -f /tmp/tmp.YtgFoIOmUw /parameters_state
+ cleanup_lbaas_netns_config
++ ip netns
++ awk '/^vrouter-/{print $1}'
+ rm -rf '/var/lib/contrail/loadbalancer/*'
+ create_agent_config /usr/bin/contrail-vrouter-agent
+ echo 'INFO: Preparing /etc/contrail/contrail-vrouter-agent.conf'
INFO: Preparing /etc/contrail/contrail-vrouter-agent.conf
+ [[ ! -f /parameters.sh ]]
+ source /parameters.sh
++ AGENT_MODE=kernel
++ AGENT_NAME=cn-jenkins-deploy-platform-ansible-os-3231-1
++ AUTH_MODE=keystone
++ BARBICAN_PASSWORD=contrail123
++ BARBICAN_TENANT_NAME=service
++ BARBICAN_USER=barbican
++ CLOUD_ORCHESTRATOR=openstack
++ COLLECTOR_SERVERS=10.0.0.38:8086
++ COMPUTE_NODE_ADDRESS=10.20.0.192
++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ CONFIG_API_SSL_ENABLE=false
++ CONFIG_NODES=10.0.0.38
++ CONTAINER_LOG_DIR=/var/log/contrail/vrouter-agent
++ CONTROL_NETWORK_IP=10.20.0.192
++ DEFAULT_LOCAL_IP=10.0.0.38
++ DNS_SERVERS_LIST=10.20.0.192:53
++ DPDK_UIO_DRIVER=uio_pci_generic
++ FABRIC_SNAT_HASH_TABLE_SIZE=4096
++ HUGEPAGES_DIR=/dev/hugepages
++ HUGE_PAGES_1GB=0
++ HUGE_PAGES_2MB=256
++ HYPERVISOR_TYPE=kvm
++ INTROSPECT_IP=0.0.0.0
++ INTROSPECT_SSL_ENABLE=false
++ INTROSPECT_SSL_INSECURE=True
++ IS_ENCRYPTION_SUPPORTED_FLAG=false
++ IS_VLAN_ENABLED=false
++ K8S_TOKEN=
++ KEYSTONE_AUTH_ADMIN_PORT=5000
++ KEYSTONE_AUTH_CA_CERTFILE=
++ KEYSTONE_AUTH_CERTFILE=
++ KEYSTONE_AUTH_HOST=10.0.0.38
++ KEYSTONE_AUTH_INSECURE=True
++ KEYSTONE_AUTH_KEYFILE=
++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=Default
++ KEYSTONE_AUTH_PROTO=http
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_REGION_NAME=RegionOne
++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens
++ KEYSTONE_AUTH_URL_VERSION=/v3
++ KEYSTONE_AUTH_USER_DOMAIN_NAME=Default
++ KUBERNETES_API_PORT=
++ KUBERNETES_API_SECURE_PORT=
++ KUBERNETES_API_SERVER=
++ L3MH_CIDR=
++ LOG_LEVEL=SYS_DEBUG
++ LOG_LOCAL=1
++ METADATA_PROXY_SECRET=contrail
++ METADATA_SSL_CA_CERTFILE=
++ METADATA_SSL_CERTFILE=
++ METADATA_SSL_CERT_TYPE=
++ METADATA_SSL_ENABLE=false
++ METADATA_SSL_KEYFILE=
++ PCI_ADDRESS=0000:00:06.0
++ PHYS_INT=ens6
++ PHYS_INT_MAC=fa:16:3e:02:69:1e
++ PHYS_INT_IPS=
++ PRIORITY_BANDWIDTH=
++ PRIORITY_ID=
++ PRIORITY_SCHEDULING=
++ PRIORITY_TAGGING=True
++ QOS_DEF_HW_QUEUE=False
++ QOS_LOGICAL_QUEUES=
++ QOS_QUEUE_ID=
++ SAMPLE_DESTINATION=collector
++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ SANDESH_SSL_ENABLE=false
++ SLO_DESTINATION=collector
++ STATS_COLLECTOR_DESTINATION_PATH=
++ SUBCLUSTER=
++ TSN_AGENT_MODE=
++ TSN_NODES='[]'
++ VROUTER_AGENT_INTROSPECT_PORT=
++ VROUTER_CIDR=10.20.0.192/24
++ VROUTER_CRYPT_INTERFACE=crypt0
++ VROUTER_GATEWAY=
++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem
++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem
++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem
++ XMPP_SERVERS_LIST=10.20.0.192:5269
++ XMPP_SSL_ENABLE=false
+ [[ -z ens6 ]]
+ [[ -z fa:16:3e:02:69:1e ]]
+ echo 'INFO: Physical interface: nic=ens6, mac=fa:16:3e:02:69:1e'
INFO: Physical interface: nic=ens6, mac=fa:16:3e:02:69:1e
+ local agent_mode_options=physical_interface_mac=fa:16:3e:02:69:1e
+ [[ kernel == \d\p\d\k ]]
+ local tsn_agent_mode=
+ [[ -n '' ]]
+ local vrouter_opts=
+ local nic=
+ local phys_ints phys_ips gateway ipaddr
+ local binding_data_dir=/var/run/vrouter
+ [[ -n '' ]]
+ vrouter_opts=physical_interface=ens6
+ [[ -n '' ]]
+ local subcluster_option=
+ [[ -n '' ]]
+ local tsn_server_list=
+ read -r -d '' tsn_server_list
++ tr , ' '
++ echo '[]'
+ true
+ local priority_group_option priority_id_list priority_bandwidth_list priority_scheduling_list
+ local qos_niantic
+ [[ -n '' ]]
+ local qos_queueing_option=
+ local qos_queue_id qos_logical_queue qos_config qos_def
+ [[ -n '' ]]
+ local metadata_ssl_conf=
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ local crypt_interface_option=
+ [[ false == \t\r\u\e ]]
+ local hugepages_option=
+ local xmpp_certs_config sandesh_client_config collector_stats_config
+ ((  HUGE_PAGES_1GB > 0  ))
+ ((  HUGE_PAGES_2MB > 0  ))
+ read -r -d '' hugepages_option
+ true
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ xmpp_certs_config=
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ read -r -d '' sandesh_client_config
+ true
+ [[ -n '' ]]
+ collector_stats_config=
+ introspect_opts=http_server_ip=0.0.0.0
+ '[' -n '' ']'
+ upgrade_old_logs vrouter-agent
+ local template=vrouter-agent
++ dirname /var/log/contrail/vrouter-agent
+ local old_dir=/var/log/contrail
+ mkdir -p /var/log/contrail/vrouter-agent
+ chmod 755 /var/log/contrail/vrouter-agent
+ mv -n '/var/log/contrail/*vrouter-agent.log*' /var/log/contrail/vrouter-agent/
+ true
+ [[ -n 1999 ]]
+ [[ -n 1999 ]]
+ local owner_opts=1999:1999
+ chown 1999:1999 /var/log/contrail/vrouter-agent
+ find /var/log/contrail/vrouter-agent -uid 0 -exec chown 1999:1999 '{}' +
+ mkdir -p /etc/contrail
+ cat
+ add_ini_params_from_env VROUTER_AGENT /etc/contrail/contrail-vrouter-agent.conf
+ local service_name=VROUTER_AGENT
+ local cfg_path=/etc/contrail/contrail-vrouter-agent.conf
+ local delim=__
++ set -o posix
++ set
++ grep '^VROUTER_AGENT__.*__.*=.*$'
++ sort
++ cut -d = -f 1
++ sed 's/^VROUTER_AGENT__//g'
+ local vars=
+ local section=
+ echo 'INFO: /etc/contrail/contrail-vrouter-agent.conf'
INFO: /etc/contrail/contrail-vrouter-agent.conf
+ cat /etc/contrail/contrail-vrouter-agent.conf
[CONTROL-NODE]
servers=10.20.0.192:5269


[DEFAULT]
http_server_ip=0.0.0.0
collectors=10.0.0.38:8086
log_file=/var/log/contrail/vrouter-agent/contrail-vrouter-agent.log
log_level=SYS_DEBUG
log_local=1

hostname=cn-jenkins-deploy-platform-ansible-os-3231-1
agent_name=cn-jenkins-deploy-platform-ansible-os-3231-1

xmpp_dns_auth_enable=false
xmpp_auth_enable=false


physical_interface_mac=fa:16:3e:02:69:1e

tsn_servers = []

[SANDESH]
introspect_ssl_enable=false
sandesh_ssl_enable=false

[NETWORKS]
control_network_ip=10.20.0.192

[DNS]
servers=10.20.0.192:53

[METADATA]
metadata_proxy_secret=contrail


[VIRTUAL-HOST-INTERFACE]
name=vhost0
ip=10.20.0.192/24
compute_node_address=10.20.0.192
physical_interface=ens6

[SERVICE-INSTANCE]
netns_command=/usr/local/bin/opencontrail-vrouter-netns
docker_command=/usr/local/bin/opencontrail-vrouter-docker

[HYPERVISOR]
type = kvm

[FLOWS]
fabric_snat_hash_table_size = 4096







[SESSION]
slo_destination = collector
sample_destination = collector



[RESTART]
huge_page_2M=/dev/hugepages/bridge /dev/hugepages/flow
+ set_vnc_api_lib_ini
+ local tmp_file=/etc/contrail/vnc_api_lib.ini.tmp
+ cat
+ is_enabled false
+ local val=false
+ [[ false == \t\r\u\e ]]
+ [[ false == \y\e\s ]]
+ [[ false == \e\n\a\b\l\e\d ]]
+ [[ keystone == \k\e\y\s\t\o\n\e ]]
+ cat
+ [[ http == \h\t\t\p\s ]]
+ mv -f /etc/contrail/vnc_api_lib.ini.tmp /etc/contrail/vnc_api_lib.ini
+ cat
+ start_agent /usr/bin/contrail-vrouter-agent
+ echo 'INFO: Run start_agent'
INFO: Run start_agent
+ [[ ! -f /etc/contrail/contrail-vrouter-agent.conf ]]
+ set_qos
+ local interface_list mode policy slaves pci_addresses bond_numa
+ [[ -n '' ]]
+ [[ -n '' ]]
+ true
+ rm -f /var/run/restart_agent
+ [[ 1 == \0 ]]
+ echo 'INFO: Start vrouter-agent using command: /usr/bin/contrail-vrouter-agent'
INFO: Start vrouter-agent using command: /usr/bin/contrail-vrouter-agent
+ local vrouter_agent_process=91814
+ echo 91814
+ /usr/bin/contrail-vrouter-agent
+ is_encryption_supported
+ local enc=False
+ [[ FALSE == \F\A\L\S\E ]]
+ return 1
+ echo 'INFO: Kernel version does not support vrouter to vrouter encryption - Not adding decrypt0 to vrouter'
INFO: Kernel version does not support vrouter to vrouter encryption - Not adding decrypt0 to vrouter
+ echo 'INFO: vrouter agent process PID: 91814'
INFO: vrouter agent process PID: 91814
++ cat /var/run/vrouter-agent.pid
+ wait 91814
Config file </etc/contrail/contrail-vrouter-agent.conf> parsing completed.
log4cplus:ERROR No appenders could be found for logger (root).
log4cplus:ERROR Please initialize the log4cplus system properly.
INFO: wait vhost0 to be initilaized... 0/60
INFO: vhost0 is ready.
dev_idx = 8, dev_name = vhost0