++ LOG_DIR=/var/log/contrail ++ export CONTAINER_LOG_DIR=/var/log/contrail/config-database-rabbitmq ++ CONTAINER_LOG_DIR=/var/log/contrail/config-database-rabbitmq ++ mkdir -p /var/log/contrail/config-database-rabbitmq ++ log_file=/var/log/contrail/config-database-rabbitmq/console.log ++ touch /var/log/contrail/config-database-rabbitmq/console.log ++ chmod 600 /var/log/contrail/config-database-rabbitmq/console.log ++ exec +++ tee -a /var/log/contrail/config-database-rabbitmq/console.log +++ date ++ echo 'INFO: =================== Mon Sep 2 02:15:00 UTC 2024 ===================' INFO: =================== Mon Sep 2 02:15:00 UTC 2024 =================== ++ LOG_LOCAL=1 ++ source /functions.sh ++ source /contrail-functions.sh +++ get_default_ip ++++ get_default_nic ++++ get_gateway_nic_for_ip 1 ++++ command -v ip ++++ local ip=1 +++++ ip route get 1 +++++ grep -o 'dev.*' +++++ awk '{print $2}' ++++ local iface=ens3 ++++ [[ ens3 == \l\o ]] ++++ echo ens3 +++ local nic=ens3 +++ get_ip_for_nic ens3 +++ local nic=ens3 +++ get_cidr_for_nic ens3 +++ command -v ip +++ cut -d / -f 1 +++ local nic=ens3 +++ grep 'inet ' +++ awk '{print $2}' +++ ip addr show dev ens3 +++ head -n 1 ++ DEFAULT_LOCAL_IP=10.0.0.24 ++ ENCAP_PRIORITY=MPLSoUDP,MPLSoGRE,VXLAN ++ VXLAN_VN_ID_MODE=automatic ++ DPDK_UIO_DRIVER=uio_pci_generic ++ CPU_CORE_MASK=0x01 ++ SERVICE_CORE_MASK= ++ DPDK_CTRL_THREAD_MASK= ++ HUGE_PAGES= ++ HUGE_PAGES_DIR=/dev/hugepages ++ HUGE_PAGES_1GB=0 ++ HUGE_PAGES_2MB=0 ++ HUGE_PAGES_1GB_DIR= ++ HUGE_PAGES_2MB_DIR= ++ [[ 0 != 0 ]] ++ [[ 0 != 0 ]] ++ DPDK_MEM_PER_SOCKET=1024 ++ DPDK_COMMAND_ADDITIONAL_ARGS= ++ NIC_OFFLOAD_ENABLE=False ++ DPDK_ENABLE_VLAN_FWRD=False ++ DIST_SNAT_PROTO_PORT_LIST= ++ CLOUD_ORCHESTRATOR=openstack ++ CLOUD_ADMIN_ROLE=admin ++ AAA_MODE=rbac ++ AUTH_MODE=noauth ++ AUTH_PARAMS= ++ SSL_ENABLE=True ++ SSL_INSECURE=True ++ SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ SERVER_CA_KEYFILE=/etc/contrail/ssl/private/ca-key.pem ++ SELFSIGNED_CERTS_WITH_IPS=True ++ CONTROLLER_NODES=10.0.0.24 ++ ANALYTICS_ALARM_ENABLE=False ++ ANALYTICS_SNMP_ENABLE=False ++ ANALYTICSDB_ENABLE=False ++ ANALYTICS_NODES=10.0.0.24 ++ ANALYTICSDB_NODES=10.0.0.24 ++ ANALYTICS_SNMP_NODES=10.0.0.24 ++ ANALYTICS_API_PORT=8081 ++ ANALYTICS_API_INTROSPECT_PORT=8090 ++ ANALYTICSDB_PORT=9160 ++ ANALYTICSDB_CQL_PORT=9042 ++ TOPOLOGY_INTROSPECT_PORT=5921 ++ QUERYENGINE_INTROSPECT_PORT=8091 +++ get_server_list ANALYTICS ':8081 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8081 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+='10.0.0.24:8081 ' +++ '[' -n '10.0.0.24:8081 ' ']' +++ echo 10.0.0.24:8081 ++ ANALYTICS_SERVERS=10.0.0.24:8081 +++ get_server_list ANALYTICSDB ':9042 ' +++ local server_typ=ANALYTICSDB_NODES +++ local 'port_with_delim=:9042 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+='10.0.0.24:9042 ' +++ '[' -n '10.0.0.24:9042 ' ']' +++ echo 10.0.0.24:9042 ++ ANALYTICSDB_CQL_SERVERS=10.0.0.24:9042 ++ ANALYTICS_API_VIP= ++ ANALYTICS_ALARM_NODES=10.0.0.24 ++ ALARMGEN_INTROSPECT_PORT=5995 ++ BGP_PORT=179 ++ BGP_AUTO_MESH=true ++ BGP_ASN=64512 ++ ENABLE_4BYTE_AS=false ++ APPLY_DEFAULTS=true ++ COLLECTOR_PORT=8086 ++ COLLECTOR_INTROSPECT_PORT=8089 ++ COLLECTOR_SYSLOG_PORT=514 ++ COLLECTOR_SFLOW_PORT=6343 ++ COLLECTOR_IPFIX_PORT=4739 ++ COLLECTOR_PROTOBUF_PORT=3333 ++ COLLECTOR_STRUCTURED_SYSLOG_PORT=3514 ++ SNMPCOLLECTOR_INTROSPECT_PORT=5920 +++ get_server_list ANALYTICS ':8086 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:8086 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+='10.0.0.24:8086 ' +++ '[' -n '10.0.0.24:8086 ' ']' +++ echo 10.0.0.24:8086 ++ COLLECTOR_SERVERS=10.0.0.24:8086 ++ CASSANDRA_PORT=9160 ++ CASSANDRA_CQL_PORT=9042 ++ CASSANDRA_SSL_STORAGE_PORT=7011 ++ CASSANDRA_STORAGE_PORT=7010 ++ CASSANDRA_JMX_LOCAL_PORT=7200 ++ CONFIGDB_CASSANDRA_DRIVER=cql ++ CONFIG_NODES=10.0.0.24 ++ CONFIGDB_NODES=10.0.0.24 ++ CONFIG_API_PORT=8082 ++ CONFIG_API_INTROSPECT_PORT=8084 ++ CONFIG_API_ADMIN_PORT=8095 ++ CONFIGDB_PORT=9161 ++ CONFIGDB_CQL_PORT=9041 +++ get_server_list CONFIG ':8082 ' +++ local server_typ=CONFIG_NODES +++ local 'port_with_delim=:8082 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+='10.0.0.24:8082 ' +++ '[' -n '10.0.0.24:8082 ' ']' +++ echo 10.0.0.24:8082 ++ CONFIG_SERVERS=10.0.0.24:8082 +++ get_server_list CONFIGDB ':9161 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9161 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+='10.0.0.24:9161 ' +++ '[' -n '10.0.0.24:9161 ' ']' +++ echo 10.0.0.24:9161 ++ CONFIGDB_SERVERS=10.0.0.24:9161 +++ get_server_list CONFIGDB ':9041 ' +++ local server_typ=CONFIGDB_NODES +++ local 'port_with_delim=:9041 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+='10.0.0.24:9041 ' +++ '[' -n '10.0.0.24:9041 ' ']' +++ echo 10.0.0.24:9041 ++ CONFIGDB_CQL_SERVERS=10.0.0.24:9041 ++ CONFIG_API_VIP= ++ CONFIG_API_SSL_ENABLE=True ++ CONFIG_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CONFIG_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CONFIG_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CONFIG_API_WORKER_COUNT=1 ++ CONFIG_API_MAX_REQUESTS=1024 ++ ANALYTICS_API_SSL_ENABLE=True ++ ANALYTICS_API_SSL_INSECURE=True ++ ANALYTICS_API_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ ANALYTICS_API_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ ANALYTICS_API_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_ENABLE=True ++ CASSANDRA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ CASSANDRA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ CASSANDRA_SSL_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ CASSANDRA_SSL_KEYSTORE_PASSWORD=astrophytum ++ CASSANDRA_SSL_TRUSTSTORE_PASSWORD=ornatum ++ CASSANDRA_SSL_PROTOCOL=TLS ++ CASSANDRA_SSL_ALGORITHM=SunX509 ++ CASSANDRA_SSL_CIPHER_SUITES='[TLS_RSA_WITH_AES_128_CBC_SHA,TLS_RSA_WITH_AES_256_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_256_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA]' ++ CASSANDRA_CONFIG_MEMTABLE_FLUSH_WRITER=4 ++ CASSANDRA_CONFIG_CONCURRECT_COMPACTORS=4 ++ CASSANDRA_CONFIG_COMPACTION_THROUGHPUT_MB_PER_SEC=256 ++ CASSANDRA_CONFIG_CONCURRECT_READS=64 ++ CASSANDRA_CONFIG_CONCURRECT_WRITES=64 ++ CASSANDRA_CONFIG_MEMTABLE_ALLOCATION_TYPE=offheap_objects ++ CASSANDRA_REAPER_ENABLED=false ++ CASSANDRA_REAPER_JMX_KEY=reaperJmxKey ++ CASSANDRA_REAPER_JMX_AUTH_USERNAME=reaperUser ++ CASSANDRA_REAPER_JMX_AUTH_PASSWORD=reaperPass ++ CASSANDRA_REAPER_APP_PORT=8071 ++ CASSANDRA_REAPER_ADM_PORT=8072 ++ CONTROL_NODES=10.0.0.24 ++ CONTROL_INTROSPECT_PORT=8083 ++ DNS_NODES=10.0.0.24 ++ DNS_SERVER_PORT=53 ++ DNS_INTROSPECT_PORT=8092 ++ RNDC_KEY=xvysmOR8lnUQRBcunkC6vg== ++ USE_EXTERNAL_TFTP=False ++ ZOOKEEPER_NODES=10.0.0.24 ++ ZOOKEEPER_PORT=2181 ++ ZOOKEEPER_PORTS=2888:3888 +++ get_server_list ZOOKEEPER :2181, +++ local server_typ=ZOOKEEPER_NODES +++ local port_with_delim=:2181, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+=10.0.0.24:2181, +++ '[' -n 10.0.0.24:2181, ']' +++ echo 10.0.0.24:2181 ++ ZOOKEEPER_SERVERS=10.0.0.24:2181 +++ get_server_list ZOOKEEPER ':2181 ' +++ local server_typ=ZOOKEEPER_NODES +++ local 'port_with_delim=:2181 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+='10.0.0.24:2181 ' +++ '[' -n '10.0.0.24:2181 ' ']' +++ echo 10.0.0.24:2181 ++ ZOOKEEPER_SERVERS_SPACE_DELIM=10.0.0.24:2181 ++ RABBITMQ_NODES=10.0.0.24 ++ RABBITMQ_NODE_PORT=5673 +++ get_server_list RABBITMQ :5673, +++ local server_typ=RABBITMQ_NODES +++ local port_with_delim=:5673, +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+=10.0.0.24:5673, +++ '[' -n 10.0.0.24:5673, ']' +++ echo 10.0.0.24:5673 ++ RABBITMQ_SERVERS=10.0.0.24:5673 ++ RABBITMQ_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT=true ++ RABBITMQ_VHOST=/ ++ RABBITMQ_USER=guest ++ RABBITMQ_PASSWORD=guest ++ RABBITMQ_USE_SSL=True ++ RABBITMQ_SSL_VER=tlsv1.2 ++ RABBITMQ_CLIENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ RABBITMQ_CLIENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ RABBITMQ_CLIENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ RABBITMQ_HEARTBEAT_INTERVAL=60 ++ RABBITMQ_CLUSTER_PARTITION_HANDLING=autoheal ++ RABBITMQ_MIRRORED_QUEUE_MODE=all ++ REDIS_SERVER_PORT=6379 ++ REDIS_SERVER_PASSWORD= +++ get_server_list ANALYTICS ':6379 ' +++ local server_typ=ANALYTICS_NODES +++ local 'port_with_delim=:6379 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+='10.0.0.24:6379 ' +++ '[' -n '10.0.0.24:6379 ' ']' +++ echo 10.0.0.24:6379 ++ REDIS_SERVERS=10.0.0.24:6379 ++ REDIS_LISTEN_ADDRESS= ++ REDIS_PROTECTED_MODE= ++ REDIS_SSL_ENABLE=True ++ REDIS_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ REDIS_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ REDIS_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' redis_ssl_config ++ true ++ KAFKA_NODES=10.0.0.24 ++ KAFKA_PORT=9092 +++ get_server_list KAFKA ':9092 ' +++ local server_typ=KAFKA_NODES +++ local 'port_with_delim=:9092 ' +++ local server_list= +++ IFS=, +++ read -ra server_list +++ local extended_server_list= +++ for server in '"${server_list[@]}"' ++++ echo 10.0.0.24 +++ local server_address=10.0.0.24 +++ extended_server_list+='10.0.0.24:9092 ' +++ '[' -n '10.0.0.24:9092 ' ']' +++ echo 10.0.0.24:9092 ++ KAFKA_SERVERS=10.0.0.24:9092 ++ KAFKA_SSL_ENABLE=True ++ KAFKA_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ KAFKA_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ KAFKA_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ KEYSTONE_AUTH_ADMIN_TENANT=admin ++ KEYSTONE_AUTH_ADMIN_USER=admin ++ KEYSTONE_AUTH_ADMIN_PASSWORD=password ++ KEYSTONE_AUTH_PROJECT_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_USER_DOMAIN_NAME=admin_domain ++ KEYSTONE_AUTH_REGION_NAME=RegionOne ++ KEYSTONE_AUTH_URL_VERSION=/v3 ++ KEYSTONE_AUTH_HOST=252.24.101.20 ++ KEYSTONE_AUTH_PROTO=http ++ KEYSTONE_AUTH_ADMIN_PORT=5050 ++ KEYSTONE_AUTH_PUBLIC_PORT=5050 ++ KEYSTONE_AUTH_URL_TOKENS=/v3/auth/tokens ++ KEYSTONE_AUTH_INSECURE=True ++ KEYSTONE_AUTH_CERTFILE= ++ KEYSTONE_AUTH_KEYFILE= ++ KEYSTONE_AUTH_CA_CERTFILE= ++ KEYSTONE_AUTH_ENDPOINT_TYPE= ++ KEYSTONE_AUTH_SYNC_ON_DEMAND= ++ KEYSTONE_AUTH_INTERFACE=public ++ KUBEMANAGER_NODES=10.0.0.24 ++ KUBERNETES_CLUSTER_NAME=k8s ++ KUBERNETES_CNI_META_PLUGIN=multus ++ METADATA_PROXY_SECRET=contrail ++ BARBICAN_TENANT_NAME=service ++ BARBICAN_USER=barbican ++ BARBICAN_PASSWORD=password ++ AGENT_MODE=kernel ++ EXTERNAL_ROUTERS= ++ SUBCLUSTER= ++ VROUTER_COMPUTE_NODE_ADDRESS= ++ VROUTER_CRYPT_INTERFACE=crypt0 ++ VROUTER_DECRYPT_INTERFACE=decrypt0 ++ VROUTER_DECRYPT_KEY=15 ++ VROUTER_MODULE_OPTIONS= ++ FABRIC_SNAT_HASH_TABLE_SIZE=4096 ++ TSN_EVPN_MODE=False ++ TSN_NODES='[]' ++ PRIORITY_ID= ++ PRIORITY_BANDWIDTH= ++ PRIORITY_SCHEDULING= ++ QOS_QUEUE_ID= ++ QOS_LOGICAL_QUEUES= ++ QOS_DEF_HW_QUEUE=False ++ PRIORITY_TAGGING=True ++ SLO_DESTINATION=collector ++ '[' -n '' ']' ++ SAMPLE_DESTINATION=collector ++ FLOW_EXPORT_RATE=0 ++ WEBUI_NODES=10.0.0.24 ++ WEBUI_JOB_SERVER_PORT=3000 ++ KUE_UI_PORT=3002 ++ WEBUI_HTTP_LISTEN_PORT=8180 ++ WEBUI_HTTPS_LISTEN_PORT=8143 ++ WEBUI_SSL_KEY_FILE=/etc/contrail/webui_ssl/cs-key.pem ++ WEBUI_SSL_CERT_FILE=/etc/contrail/webui_ssl/cs-cert.pem ++ WEBUI_SSL_CIPHERS=ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES256-SHA ++ WEBUI_STATIC_AUTH_USER=admin ++ WEBUI_STATIC_AUTH_PASSWORD=contrail123 ++ WEBUI_STATIC_AUTH_ROLE=cloudAdmin ++ XMPP_SERVER_PORT=5269 ++ XMPP_SSL_ENABLE=True ++ XMPP_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ XMPP_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ XMPP_SERVER_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ LINKLOCAL_SERVICE_PORT=80 ++ LINKLOCAL_SERVICE_NAME=metadata ++ LINKLOCAL_SERVICE_IP=169.254.169.254 ++ IPFABRIC_SERVICE_PORT=8775 ++ INTROSPECT_SSL_ENABLE=True ++ INTROSPECT_SSL_INSECURE=True ++ INTROSPECT_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ INTROSPECT_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ INTROSPECT_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ INTROSPECT_LISTEN_ALL=True ++ SANDESH_SSL_ENABLE=True ++ SANDESH_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_SERVER_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ SANDESH_SERVER_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ SANDESH_CA_CERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ METADATA_SSL_ENABLE=false ++ METADATA_SSL_CERTFILE= ++ METADATA_SSL_KEYFILE= ++ METADATA_SSL_CA_CERTFILE= ++ METADATA_SSL_CERT_TYPE= ++ CONFIGURE_IPTABLES=false ++ FWAAS_ENABLE=False ++ CONTAINERD_NAMESPACE=k8s.io ++ TOR_AGENT_OVS_KA=10000 ++ TOR_TYPE=ovs ++ TOR_OVS_PROTOCOL=tcp ++ TORAGENT_SSL_CERTFILE=/etc/contrail/ssl/certs/server.pem ++ TORAGENT_SSL_KEYFILE=/etc/contrail/ssl/private/server-privkey.pem ++ TORAGENT_SSL_CACERTFILE=/etc/contrail/ssl/certs/ca-cert.pem ++ [[ /v3 == \/\v\2\.\0 ]] ++ [[ openstack == \o\p\e\n\s\t\a\c\k ]] ++ AUTH_MODE=keystone ++ [[ keystone == \k\e\y\s\t\o\n\e ]] ++ AUTH_PARAMS='--admin_password password' ++ AUTH_PARAMS+=' --admin_tenant_name admin' ++ AUTH_PARAMS+=' --admin_user admin' ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' sandesh_client_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' xmpp_certs_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' analytics_api_ssl_opts ++ true ++ read -r -d '' rabbitmq_config ++ true ++ read -r -d '' rabbit_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' rabbitmq_ssl_config ++ true ++ read -r -d '' kombu_ssl_config ++ true ++ is_enabled True ++ local val=true ++ [[ true == \t\r\u\e ]] ++ read -r -d '' kafka_ssl_config ++ true ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z '' ]] ++ is_enabled False ++ local val=false ++ [[ false == \t\r\u\e ]] ++ [[ false == \y\e\s ]] ++ [[ false == \e\n\a\b\l\e\d ]] ++ export TSN_AGENT_MODE= ++ TSN_AGENT_MODE= ++ [[ -n '' ]] ++ collector_stats_config= ++ [[ -z x ]] ++ RSYSLOGD_XFLOW_LISTEN_PORT=9898 + source /functions.sh + for i in '{1..10}' ++ find_my_ip_and_order_for_node RABBITMQ ++ local server_typ=RABBITMQ_NODES ++ find_my_ip_and_order_for_node_list 10.0.0.24 ++ local servers=10.0.0.24 ++ local server_list= ++ IFS=, ++ read -ra server_list +++ get_local_ips +++ tr '\n' , +++ cat /proc/net/fib_trie +++ awk '/32 host/ { print f } {f=$2}' +++ uniq +++ grep -vi host +++ sort ++ local local_ips=,10.0.0.24,10.234.149.1,127.0.0.1,172.17.0.1,252.24.0.1,, ++ local ord=1 ++ for server in '"${server_list[@]}"' ++ local ret=0 +++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.24'\''))' ++ local server_ip=10.0.0.24 ++ [[ 0 == 0 ]] ++ [[ -n 10.0.0.24 ]] ++ [[ ,10.0.0.24,10.234.149.1,127.0.0.1,172.17.0.1,252.24.0.1,, =~ ,10\.0\.0\.24, ]] ++ echo 10.0.0.24 1 ++ return + my_ip_and_order='10.0.0.24 1' + '[' -n '10.0.0.24 1' ']' + break + '[' -z '10.0.0.24 1' ']' ++ echo 10.0.0.24 1 ++ cut -d ' ' -f 1 + my_ip=10.0.0.24 + echo 'INFO: my_ip=10.0.0.24' INFO: my_ip=10.0.0.24 + server_names_list=() + cluster_nodes= + my_node= ++ tr , ' ' ++ echo 10.0.0.24 + for server in '$(echo ${RABBITMQ_NODES} | tr '\'','\'' '\'' '\'')' ++ cut -d . -f 1 ++ resolve_hostname_by_ip 10.0.0.24 ++ local ip=10.0.0.24 +++ getent hosts 10.0.0.24 +++ head -n 1 ++ local 'host_entry=10.0.0.24 cn-jenkins-deploy-platform-juju-os-390-1' ++ local name= ++ [[ -n 10.0.0.24 cn-jenkins-deploy-platform-juju-os-390-1 ]] +++ echo 10.0.0.24 cn-jenkins-deploy-platform-juju-os-390-1 +++ awk '{print $2}' ++ name=cn-jenkins-deploy-platform-juju-os-390-1 ++ [[ -n cn-jenkins-deploy-platform-juju-os-390-1 ]] ++ echo cn-jenkins-deploy-platform-juju-os-390-1 + server_hostname=cn-jenkins-deploy-platform-juju-os-390-1 + [[ -z cn-jenkins-deploy-platform-juju-os-390-1 ]] + cluster_nodes+=''\''contrail@cn-jenkins-deploy-platform-juju-os-390-1'\'',' + server_names_list=($server_names_list $server_hostname) ++ find_my_ip_and_order_for_node_list 10.0.0.24 ++ local servers=10.0.0.24 ++ cut -d ' ' -f 1 ++ local server_list= ++ IFS=, ++ read -ra server_list +++ get_local_ips +++ tr '\n' , +++ cat /proc/net/fib_trie +++ awk '/32 host/ { print f } {f=$2}' +++ grep -vi host +++ sort +++ uniq ++ local local_ips=,10.0.0.24,10.234.149.1,127.0.0.1,172.17.0.1,252.24.0.1,, ++ local ord=1 ++ for server in '"${server_list[@]}"' ++ local ret=0 +++ python3 -c 'import socket; print(socket.gethostbyname('\''10.0.0.24'\''))' ++ local server_ip=10.0.0.24 ++ [[ 0 == 0 ]] ++ [[ -n 10.0.0.24 ]] ++ [[ ,10.0.0.24,10.234.149.1,127.0.0.1,172.17.0.1,252.24.0.1,, =~ ,10\.0\.0\.24, ]] ++ echo 10.0.0.24 1 ++ return + server_ip=10.0.0.24 + [[ ,10.0.0.24, =~ ,10\.0\.0\.24, ]] + my_node=cn-jenkins-deploy-platform-juju-os-390-1 + echo 'INFO: my_node=cn-jenkins-deploy-platform-juju-os-390-1' INFO: my_node=cn-jenkins-deploy-platform-juju-os-390-1 ++ echo 10.0.0.24 ++ tr . , + dist_ip=10,0,0,24 + RABBITMQ_NODENAME=contrail@cn-jenkins-deploy-platform-juju-os-390-1 + RABBITMQ_MGMT_PORT=15673 + RABBITMQ_DIST_PORT=25673 + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + ssl_dir=/tmp/rabbitmq-ssl + mkdir -p /tmp/rabbitmq-ssl + for cert in CERTFILE KEYFILE CACERTFILE + var=RABBITMQ_SSL_CERTFILE + val=/etc/contrail/ssl/certs/server.pem + [[ -z /etc/contrail/ssl/certs/server.pem ]] + '[' '!' -f /etc/contrail/ssl/certs/server.pem ']' + newFile=/tmp/rabbitmq-ssl/CERTFILE + cat /etc/contrail/ssl/certs/server.pem + chown rabbitmq:rabbitmq /tmp/rabbitmq-ssl/CERTFILE + chmod 0400 /tmp/rabbitmq-ssl/CERTFILE + eval 'export RABBITMQ_SSL_CERTFILE="$newFile"' ++ export RABBITMQ_SSL_CERTFILE=/tmp/rabbitmq-ssl/CERTFILE ++ RABBITMQ_SSL_CERTFILE=/tmp/rabbitmq-ssl/CERTFILE + for cert in CERTFILE KEYFILE CACERTFILE + var=RABBITMQ_SSL_KEYFILE + val=/etc/contrail/ssl/private/server-privkey.pem + [[ -z /etc/contrail/ssl/private/server-privkey.pem ]] + '[' '!' -f /etc/contrail/ssl/private/server-privkey.pem ']' + newFile=/tmp/rabbitmq-ssl/KEYFILE + cat /etc/contrail/ssl/private/server-privkey.pem + chown rabbitmq:rabbitmq /tmp/rabbitmq-ssl/KEYFILE + chmod 0400 /tmp/rabbitmq-ssl/KEYFILE + eval 'export RABBITMQ_SSL_KEYFILE="$newFile"' ++ export RABBITMQ_SSL_KEYFILE=/tmp/rabbitmq-ssl/KEYFILE ++ RABBITMQ_SSL_KEYFILE=/tmp/rabbitmq-ssl/KEYFILE + for cert in CERTFILE KEYFILE CACERTFILE + var=RABBITMQ_SSL_CACERTFILE + val=/etc/contrail/ssl/certs/ca-cert.pem + [[ -z /etc/contrail/ssl/certs/ca-cert.pem ]] + '[' '!' -f /etc/contrail/ssl/certs/ca-cert.pem ']' + newFile=/tmp/rabbitmq-ssl/CACERTFILE + cat /etc/contrail/ssl/certs/ca-cert.pem + chown rabbitmq:rabbitmq /tmp/rabbitmq-ssl/CACERTFILE + chmod 0400 /tmp/rabbitmq-ssl/CACERTFILE + eval 'export RABBITMQ_SSL_CACERTFILE="$newFile"' ++ export RABBITMQ_SSL_CACERTFILE=/tmp/rabbitmq-ssl/CACERTFILE ++ RABBITMQ_SSL_CACERTFILE=/tmp/rabbitmq-ssl/CACERTFILE + export -n RABBITMQ_NODE_PORT RABBITMQ_DIST_PORT RABBITMQ_DEFAULT_USER RABBITMQ_DEFAULT_PASS RABBITMQ_DEFAULT_VHOST + for name in CACERTFILE CERTFILE KEYFILE DEPTH FAIL_IF_NO_PEER_CERT VERIFY + export -n RABBITMQ_SSL_CACERTFILE RABBITMQ_MANAGEMENT_SSL_CACERTFILE + for name in CACERTFILE CERTFILE KEYFILE DEPTH FAIL_IF_NO_PEER_CERT VERIFY + export -n RABBITMQ_SSL_CERTFILE RABBITMQ_MANAGEMENT_SSL_CERTFILE + for name in CACERTFILE CERTFILE KEYFILE DEPTH FAIL_IF_NO_PEER_CERT VERIFY + export -n RABBITMQ_SSL_KEYFILE RABBITMQ_MANAGEMENT_SSL_KEYFILE + for name in CACERTFILE CERTFILE KEYFILE DEPTH FAIL_IF_NO_PEER_CERT VERIFY + export -n RABBITMQ_SSL_DEPTH RABBITMQ_MANAGEMENT_SSL_DEPTH + for name in CACERTFILE CERTFILE KEYFILE DEPTH FAIL_IF_NO_PEER_CERT VERIFY + export -n RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT RABBITMQ_MANAGEMENT_SSL_FAIL_IF_NO_PEER_CERT + for name in CACERTFILE CERTFILE KEYFILE DEPTH FAIL_IF_NO_PEER_CERT VERIFY + export -n RABBITMQ_SSL_VERIFY RABBITMQ_MANAGEMENT_SSL_VERIFY + echo 'INFO: RABBITMQ_NODENAME=contrail@cn-jenkins-deploy-platform-juju-os-390-1, RABBITMQ_NODE_PORT=5673' INFO: RABBITMQ_NODENAME=contrail@cn-jenkins-deploy-platform-juju-os-390-1, RABBITMQ_NODE_PORT=5673 + echo RABBITMQ_NODENAME=contrail@cn-jenkins-deploy-platform-juju-os-390-1 + echo HOME=/var/lib/rabbitmq + echo CONFIG_FILE=/etc/rabbitmq/rabbitmq.config + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + echo 'RABBITMQ_CTL_ERL_ARGS="-proto_dist inet_tls"' + [[ -n abcdefg ]] + cookie_file=/var/lib/rabbitmq/.erlang.cookie + echo abcdefg + chmod 600 /var/lib/rabbitmq/.erlang.cookie + chown rabbitmq:rabbitmq /var/lib/rabbitmq/.erlang.cookie + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + cat + cat + [[ -n all ]] ++ cat /dev/urandom ++ tr -d '\0' ++ head --bytes=4 ++ xxd -ps -c 256 + salt=d867d3db ++ xxd -ps -c 256 ++ echo -n guest + pwd=6775657374 ++ echo -n d867d3db6775657374 ++ xxd -r -p ++ sha256sum --binary ++ head -c 64 + sha256=62cbc830c08770c3896fd4627ad4c16732a254d7610f8aad8c3450bbe82f2634 ++ echo -n d867d3db62cbc830c08770c3896fd4627ad4c16732a254d7610f8aad8c3450bbe82f2634 ++ base64 -w 0 ++ xxd -r -p + b64=2GfT22LLyDDAh3DDiW/UYnrUwWcyolTXYQ+KrYw0ULvoLyY0 + cat + is_enabled True + local val=true + [[ true == \t\r\u\e ]] + [[ rabbitmq-server == rabbitmq* ]] + combinedSsl=/tmp/rabbitmq-ssl/combined.pem + cat /tmp/rabbitmq-ssl/CERTFILE /tmp/rabbitmq-ssl/KEYFILE + chown rabbitmq:rabbitmq /tmp/rabbitmq-ssl/combined.pem + chmod 0400 /tmp/rabbitmq-ssl/combined.pem ++ erl -eval 'io:format("~p", [code:lib_dir(ssl, ebin)]),halt().' -noshell + export 'ERL_SSL_PATH="/usr/lib64/erlang/lib/ssl-9.2.3.7/ebin"' + ERL_SSL_PATH='"/usr/lib64/erlang/lib/ssl-9.2.3.7/ebin"' + sslErlArgs='-pa "/usr/lib64/erlang/lib/ssl-9.2.3.7/ebin" -proto_dist inet_tls -ssl_dist_opt server_certfile /tmp/rabbitmq-ssl/combined.pem -ssl_dist_opt server_secure_renegotiate true client_secure_renegotiate true' + export 'RABBITMQ_SERVER_ADDITIONAL_ERL_ARGS= -pa "/usr/lib64/erlang/lib/ssl-9.2.3.7/ebin" -proto_dist inet_tls -ssl_dist_opt server_certfile /tmp/rabbitmq-ssl/combined.pem -ssl_dist_opt server_secure_renegotiate true client_secure_renegotiate true' + RABBITMQ_SERVER_ADDITIONAL_ERL_ARGS=' -pa "/usr/lib64/erlang/lib/ssl-9.2.3.7/ebin" -proto_dist inet_tls -ssl_dist_opt server_certfile /tmp/rabbitmq-ssl/combined.pem -ssl_dist_opt server_secure_renegotiate true client_secure_renegotiate true' + export 'RABBITMQ_CTL_ERL_ARGS= -pa "/usr/lib64/erlang/lib/ssl-9.2.3.7/ebin" -proto_dist inet_tls -ssl_dist_opt server_certfile /tmp/rabbitmq-ssl/combined.pem -ssl_dist_opt server_secure_renegotiate true client_secure_renegotiate true' + RABBITMQ_CTL_ERL_ARGS=' -pa "/usr/lib64/erlang/lib/ssl-9.2.3.7/ebin" -proto_dist inet_tls -ssl_dist_opt server_certfile /tmp/rabbitmq-ssl/combined.pem -ssl_dist_opt server_secure_renegotiate true client_secure_renegotiate true' + mkdir -p /var/log/rabbitmq /var/log/contrail/config-database-rabbitmq + chown -R rabbitmq:rabbitmq /var/log/rabbitmq + chown -R rabbitmq:rabbitmq /var/log/contrail/config-database-rabbitmq + '[' '!' -d /var/log/rabbitmq/console ']' + ln -s /var/log/contrail/config-database-rabbitmq /var/log/rabbitmq/console + setup_log_dir /var/log/rabbitmq/rabbitmq.log + local path=/var/log/rabbitmq/rabbitmq.log + local log_dir + local log_name + [[ -n /var/log/rabbitmq/rabbitmq.log ]] + [[ /var/log/rabbitmq/rabbitmq.log != \- ]] ++ dirname /var/log/rabbitmq/rabbitmq.log + log_dir=/var/log/rabbitmq + mkdir -p /var/log/rabbitmq ++ basename /var/log/rabbitmq/rabbitmq.log + log_name=rabbitmq.log ++ dirname /var/log/rabbitmq + mv -n '/var/log/rabbitmq.log*' /var/log/rabbitmq/ + touch /var/log/rabbitmq/rabbitmq.log + chown rabbitmq:rabbitmq /var/log/rabbitmq/rabbitmq.log + setup_log_dir - + local path=- + local log_dir + local log_name + [[ -n - ]] + [[ - != \- ]] + leader_node=cn-jenkins-deploy-platform-juju-os-390-1 + [[ cn-jenkins-deploy-platform-juju-os-390-1 != \c\n\-\j\e\n\k\i\n\s\-\d\e\p\l\o\y\-\p\l\a\t\f\o\r\m\-\j\u\j\u\-\o\s\-\3\9\0\-\1 ]] ++ date + echo 'INFO: Mon Sep 2 02:15:01 UTC 2024: /docker-entrypoint.sh rabbitmq-server' INFO: Mon Sep 2 02:15:01 UTC 2024: /docker-entrypoint.sh rabbitmq-server + exec /docker-entrypoint.sh rabbitmq-server + source /functions.sh + : '' + : '' + : '' + : '' + : '' + : '' + fileEnvKeys=(default_user default_pass) + sslConfigKeys=(cacertfile certfile depth fail_if_no_peer_cert keyfile verify) + managementConfigKeys=("${sslConfigKeys[@]/#/ssl_}") + rabbitConfigKeys=(default_pass default_user default_vhost vm_memory_high_watermark) + fileConfigKeys=(management_ssl_cacertfile management_ssl_certfile management_ssl_keyfile ssl_cacertfile ssl_certfile ssl_keyfile) + allConfigKeys=("${managementConfigKeys[@]/#/management_}" "${rabbitConfigKeys[@]}" "${sslConfigKeys[@]/#/ssl_}") + configDefaults=([management_ssl_fail_if_no_peer_cert]='false' [management_ssl_verify]='verify_none' [ssl_fail_if_no_peer_cert]='true' [ssl_verify]='verify_peer') + declare -A configDefaults + [[ rabbitmq-server == rabbitmq* ]] ++ id -u + '[' 0 = 0 ']' + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_MANAGEMENT_SSL_CACERTFILE + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_MANAGEMENT_SSL_CERTFILE + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_MANAGEMENT_SSL_DEPTH + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_MANAGEMENT_SSL_FAIL_IF_NO_PEER_CERT + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_MANAGEMENT_SSL_KEYFILE + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_MANAGEMENT_SSL_VERIFY + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_DEFAULT_PASS + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_DEFAULT_USER + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_DEFAULT_VHOST + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_VM_MEMORY_HIGH_WATERMARK + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_SSL_CACERTFILE + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_SSL_CERTFILE + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_SSL_DEPTH + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_SSL_FAIL_IF_NO_PEER_CERT + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_SSL_KEYFILE + val= + '[' -n '' ']' + continue + for conf in '"${allConfigKeys[@]}"' + var=RABBITMQ_SSL_VERIFY + val= + '[' -n '' ']' + continue + '[' rabbitmq-server = rabbitmq-server ']' + find /var/lib/rabbitmq '!' -user rabbitmq -exec chown rabbitmq '{}' + ++ id -u rabbitmq + CONTRAIL_UID=999 ++ id -g rabbitmq + CONTRAIL_GID=998 + ulimit -n 65536 + do_run_service rabbitmq-server + [[ -n 999 ]] + [[ -n 998 ]] + mkdir -p /var/crashes + chmod 777 /var/crashes ++ id -un 999 + local user_name=rabbitmq + export HOME=/home/rabbitmq + HOME=/home/rabbitmq + mkdir -p /home/rabbitmq + chown -R 999:998 /home/rabbitmq + exec setpriv --reuid 999 --regid 998 --clear-groups --no-new-privs rabbitmq-server Using the deprecated config parameter 'rabbit.log_levels' together with a new parameter for log categories. 'rabbit.log_levels' will be ignored. Please remove it from the config. More at https://rabbitmq.com/logging.html ## ## ## ## RabbitMQ 3.7.28. Copyright (c) 2007-2020 Pivotal Software, Inc. ########## Licensed under the MPL. See https://www.rabbitmq.com/ ###### ## ########## Logs: /var/log/rabbitmq/contrail@cn-jenkins-deploy-platform-juju-os-390-1_upgrade.log /var/log/rabbitmq/rabbitmq.log Starting broker... completed with 3 plugins.